You don’t have any rules for port 8443. We would need to find out which chain the rule should go inside But something similar to this should fix the problem:
iptables -I INPUT -p tcp —-dport 8443 -j ACCEPT Though I’d be more concerned as to why the rule wasn’t put in place from the get go. -- John Skarbek On February 10, 2016 at 05:59:16, Stéphane Klein ([email protected]<mailto:[email protected]>) wrote: Do you see my mistake ? It's the default iptable config on CentOS. 2016-02-10 11:48 GMT+01:00 Stéphane Klein <[email protected]<mailto:[email protected]>>: 2016-02-10 11:44 GMT+01:00 Clayton Coleman <[email protected]<mailto:[email protected]>>: Firewall it is :) ``` iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ACCEPT all -- anywhere anywhere INPUT_direct all -- anywhere anywhere INPUT_ZONES_SOURCE all -- anywhere anywhere INPUT_ZONES all -- anywhere anywhere ACCEPT icmp -- anywhere anywhere REJECT all -- anywhere anywhere reject-with icmp-host-prohibited Chain FORWARD (policy ACCEPT) target prot opt source destination DOCKER all -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ACCEPT all -- anywhere anywhere FORWARD_direct all -- anywhere anywhere FORWARD_IN_ZONES_SOURCE all -- anywhere anywhere FORWARD_IN_ZONES all -- anywhere anywhere FORWARD_OUT_ZONES_SOURCE all -- anywhere anywhere FORWARD_OUT_ZONES all -- anywhere anywhere ACCEPT icmp -- anywhere anywhere REJECT all -- anywhere anywhere reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) target prot opt source destination OUTPUT_direct all -- anywhere anywhere Chain DOCKER (1 references) target prot opt source destination Chain FORWARD_IN_ZONES (1 references) target prot opt source destination FWDI_public all -- anywhere anywhere [goto] FWDI_public all -- anywhere anywhere [goto] Chain FORWARD_IN_ZONES_SOURCE (1 references) target prot opt source destination Chain FORWARD_OUT_ZONES (1 references) target prot opt source destination FWDO_public all -- anywhere anywhere [goto] FWDO_public all -- anywhere anywhere [goto] Chain FORWARD_OUT_ZONES_SOURCE (1 references) target prot opt source destination Chain FORWARD_direct (1 references) target prot opt source destination Chain FWDI_public (2 references) target prot opt source destination FWDI_public_log all -- anywhere anywhere FWDI_public_deny all -- anywhere anywhere FWDI_public_allow all -- anywhere anywhere Chain FWDI_public_allow (1 references) target prot opt source destination Chain FWDI_public_deny (1 references) target prot opt source destination Chain FWDI_public_log (1 references) target prot opt source destination Chain FWDO_public (2 references) target prot opt source destination FWDO_public_log all -- anywhere anywhere FWDO_public_deny all -- anywhere anywhere FWDO_public_allow all -- anywhere anywhere Chain FWDO_public_allow (1 references) target prot opt source destination Chain FWDO_public_deny (1 references) target prot opt source destination Chain FWDO_public_log (1 references) target prot opt source destination Chain INPUT_ZONES (1 references) target prot opt source destination IN_public all -- anywhere anywhere [goto] IN_public all -- anywhere anywhere [goto] Chain INPUT_ZONES_SOURCE (1 references) target prot opt source destination Chain INPUT_direct (1 references) target prot opt source destination Chain IN_public (2 references) target prot opt source destination IN_public_log all -- anywhere anywhere IN_public_deny all -- anywhere anywhere IN_public_allow all -- anywhere anywhere Chain IN_public_allow (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:ssh ctstate NEW Chain IN_public_deny (1 references) target prot opt source destination Chain IN_public_log (1 references) target prot opt source destination Chain OUTPUT_direct (1 references) target prot opt source destination [root@localhost vagrant]# ``` -- Stéphane Klein <[email protected]<mailto:[email protected]>> blog: http://stephane-klein.info<https://urldefense.proofpoint.com/v2/url?u=http-3A__stephane-2Dklein.info&d=CwMGaQ&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=8IlWeJZqFtf8Tvx1PDV9NsLfM_M0oNfzEXXNp-tpx74&m=OpA2oOuC9XEUzklU_DnojVGit3rcohbsGxbgLLMFLHE&s=vaY3pMIRbiAiJpzP15gPFLf2nyPX7bRPuy2z5ArcPyU&e=> cv : http://cv.stephane-klein.info<https://urldefense.proofpoint.com/v2/url?u=http-3A__cv.stephane-2Dklein.info&d=CwMGaQ&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=8IlWeJZqFtf8Tvx1PDV9NsLfM_M0oNfzEXXNp-tpx74&m=OpA2oOuC9XEUzklU_DnojVGit3rcohbsGxbgLLMFLHE&s=OYnbz2Lx_JdqGxqqTpDgWEhBkgTGnpnrrL0Egvqvpag&e=> Twitter: http://twitter.com/klein_stephane<https://urldefense.proofpoint.com/v2/url?u=http-3A__twitter.com_klein-5Fstephane&d=CwMGaQ&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=8IlWeJZqFtf8Tvx1PDV9NsLfM_M0oNfzEXXNp-tpx74&m=OpA2oOuC9XEUzklU_DnojVGit3rcohbsGxbgLLMFLHE&s=9jsL3BjUB0Oyh_H0JWjy1_hJKHZLFje4ybkzJbsjz1I&e=> _______________________________________________ users mailing list [email protected] https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openshift.redhat.com_openshiftmm_listinfo_users&d=CwICAg&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=8IlWeJZqFtf8Tvx1PDV9NsLfM_M0oNfzEXXNp-tpx74&m=OpA2oOuC9XEUzklU_DnojVGit3rcohbsGxbgLLMFLHE&s=vqBMVfHHKcXllyT1O88-t61JHa4743YXjan-9Cdwlfs&e=
_______________________________________________ users mailing list [email protected] http://lists.openshift.redhat.com/openshiftmm/listinfo/users
