Tcp6 0 0 [: :] : 10053 [: :] : * LISTEN
Tcp6 0 0 [: :] : 9094 [: :] : * LISTEN
Tcp6 0 0 [: :] : xinetd [: :] : * LISTEN
Tcp6 0 0 [: :] : 7051 [: :] : * LISTEN
Tcp6 0 0 [: :] : 7053 [: :] : * LISTEN
Tcp6 0 0 [: :] : 7054 [: :] : * LISTEN
Tcp6 0 0 [: :] : 50000 [: :] : * LISTEN
Tcp6 0 0 [: :] : 8054 [: :] : * LISTEN
Tcp6 0 0 [: :] : 9050 [: :] : * LISTEN
Tcp6 0 0 [: :] : 9051 [: :] : * LISTEN
Tcp6 0 0 [: :] : 9053 [: :] : * LISTEN
Tcp6 0 0 [: :] : zabbix - trapper [: :] : * LISTEN
Tcp6 0 0 [: :] : 9092 [: :] : * LISTEN
CodePudding user response:
LISTEN, this is not an existing connection, just a listener, said system waiting for the client to connect to on these portsCodePudding user response:
But I in other machines Telnet the IP port 50000, Telnet impassability ah,CodePudding user response:
Check the two places, one is the network impassability, a port is not open open,Check between the client and the IP, whether can reach, and then to the iptables or firewalld check and have the port clearance,
CodePudding user response:
There are selinuxCodePudding user response:
Two machines IP certainly can reach, when the remote login, because the two machines inPort should also release, all ports have no limit,
CodePudding user response:
The iptables performs the following:Root @ iZ2zef1hubdcrpqe132hx4Z: ~ # iptables -l
Chain INPUT (policy ACCEPT)
Target prot opt source destination
Chain FORWARD policy (DROP)
Target prot opt source destination
DOCKER - USER all - anywhere anywhere
DOCKER - ISOLATION all -- anywhere anywhere
ACCEPT all - anywhere anywhere ctstate RELATED, ESTABLISHED
DOCKER all - anywhere anywhere
ACCEPT all - anywhere anywhere
ACCEPT all - anywhere anywhere
ACCEPT all - anywhere anywhere ctstate RELATED, ESTABLISHED
DOCKER all - anywhere anywhere
ACCEPT all - anywhere anywhere
ACCEPT all - anywhere anywhere
ACCEPT all - anywhere anywhere ctstate RELATED, ESTABLISHED
DOCKER all - anywhere anywhere
ACCEPT all - anywhere anywhere
ACCEPT all - anywhere anywhere
Chain the OUTPUT (the policy ACCEPT)
Target prot opt source destination
Chain DOCKER (3 references)
Target prot opt source destination
ACCEPT the TCP - anywhere 192.168.32.2 TCP DPT: 7054
ACCEPT the TCP - anywhere 192.168.32.3 TCP DPT: 7053
ACCEPT the TCP - anywhere 192.168.32.3 TCP DPT: 7051
ACCEPT the TCP - anywhere 192.168.32.4 TCP DPT: 7054
ACCEPT the TCP - anywhere 192.168.32.5 TCP DPT: 7053
ACCEPT the TCP - anywhere 192.168.32.5 TCP DPT: 7051
ACCEPT the TCP - anywhere 192.168.32.7 TCP DPT: 7053
ACCEPT the TCP - anywhere 192.168.32.7 TCP DPT: 7051
ACCEPT the TCP - anywhere 192.168.32.11 TCP DPT: 9092
ACCEPT the TCP - anywhere 192.168.32.12 TCP DPT: 9092
ACCEPT the TCP - anywhere 192.168.32.13 TCP DPT: 9092
ACCEPT the TCP - anywhere 192.168.32.16 TCP DPT: 7050
Chain DOCKER - ISOLATION references (1)
Target prot opt source destination
DROP all - anywhere anywhere
DROP all - anywhere anywhere
DROP all - anywhere anywhere
DROP all - anywhere anywhere
DROP all - anywhere anywhere
DROP all - anywhere anywhere
RETURN all - anywhere anywhere
Chain DOCKER - USER references (1)
Target prot opt source destination
RETURN all - anywhere anywhere