-
DescriptionI am using version: '3.9'
services:
utorrent:
image: ekho/utorrent:latest
volumes:
- utorrent-settings:/utorrent/settings
- /home/Data/data:/data
- /home/Data/abs:/abs-path-dir
environment:
UID: 1000
GID: 1000
webui: ng
dir_autoload_delete: true
dir_download: subdir1,/abs-path-dir
network_mode: bridge
ports:
- "9080:8080"
- "7881:6881"
- "7881:6881/udp"
restart: always
logging:
driver: "json-file"
options:
max-size: "10m"
max-file: "3"
volumes:
utorrent-settings: After building and starting the container, i tried to access the webui from LAN, but can't get through. However, it is OK when i tried to access in the localhost. Steps to reproduce the issue
Describe the results you received and expectedI want to access the exposed port of my containers from LAN in bridge mode. What version of nerdctl are you using?WARN[0000] unable to determine buildctl version: exec: "buildctl": executable file not found in $PATH Server: Are you using a variant of nerdctl? (e.g., Rancher Desktop)None Host informationClient: Server: WARNING: bridge-nf-call-iptables is disabled |
Beta Was this translation helpful? Give feedback.
Replies: 16 comments 3 replies
-
Would you mind providing the following Content:
|
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
Additionally, i can access the containers with host mode from LAN. |
Beta Was this translation helpful? Give feedback.
-
some extra steps that my help you :
by the way are you able to connect to other service in your PC (different from containers) from the LAN ? |
Beta Was this translation helpful? Give feedback.
-
After i changed the container's network_mode to host, I can access the service from LAN using the same port. So i think the problem is with the bridge network_mode. |
Beta Was this translation helpful? Give feedback.
-
when a container is using a bridge network and exposing a port to be reached from the LAN, you need to add a firewall rule to allow traffic to the container. By default, incoming traffic from the LAN is blocked by the firewall on the host machine. When you expose a port on the container, you are allowing incoming traffic on that port to reach the container( bridge private network), but you still need to configure the firewall on the host machine to allow the traffic through. To allow incoming traffic on the exposed port, you can add a firewall rule to the INPUT chain of the iptables firewall on the host machine. The rule should allow incoming traffic on the port that you exposed in the container.
This rule will add a new rule to the INPUT chain of the iptables firewall, allowing incoming TCP traffic on port 80. Replace "80" with the port number that you exposed in the container. Would you also please list you host firewall rules |
Beta Was this translation helpful? Give feedback.
-
Sorry, I just check this. Looks like the socket |
Beta Was this translation helpful? Give feedback.
-
Thanks for the information I may have some guess about this issue base on the information
|
Beta Was this translation helpful? Give feedback.
-
Thank you for your help, and i think maybe there is something wrong with my network configuration.
br-7ce369a500d0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.4.5.1 netmask 255.255.255.0 broadcast 10.4.5.255
inet6 fe80::b83c:8dff:fecd:3719 prefixlen 64 scopeid 0x20<link>
ether f6:f7:a9:cc:9a:4b txqueuelen 1000 (Ethernet)
RX packets 2394583 bytes 140209568 (133.7 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 146656 bytes 11225726 (10.7 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
br-93daabeac2b4: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.4.6.1 netmask 255.255.255.0 broadcast 10.4.6.255
inet6 fe80::9857:1bff:fec1:25d5 prefixlen 64 scopeid 0x20<link>
ether 7a:87:4c:ec:3c:43 txqueuelen 1000 (Ethernet)
RX packets 223138 bytes 26691280 (25.4 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 252727 bytes 62600777 (59.7 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
enp3s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 114.212.xxx.xxx netmask 255.255.248.0 broadcast 114.212.xxx.xxx
inet6 fe80::56e1:adff:fef5:4291 prefixlen 64 scopeid 0x20<link>
ether 54:e1:ad:f5:42:91 txqueuelen 1000 (Ethernet)
RX packets 2236318534 bytes 2285112770255 (2.0 TiB)
RX errors 0 dropped 16509 overruns 0 frame 0
TX packets 1326974423 bytes 867532976245 (807.9 GiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
nerdctl0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.4.0.1 netmask 255.255.255.0 broadcast 10.4.0.255
inet6 fe80::d8e5:a5ff:fe99:5d26 prefixlen 64 scopeid 0x20<link>
ether 8e:d2:e9:89:55:a4 txqueuelen 1000 (Ethernet)
RX packets 3573578 bytes 593810839 (566.3 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 1134745 bytes 482611238 (460.2 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
[
{
"CNI": {
"cniVersion": "1.0.0",
"name": "bridge",
"nerdctlID": "17f29b073143d8cd97b5bbe492bdeffec1c5fee55cc1fe2112c8b9335f8b6121",
"nerdctlLabels": {},
"plugins": [
{
"type": "bridge",
"bridge": "nerdctl0",
"isGateway": true,
"ipMasq": true,
"hairpinMode": true,
"ipam": {
"ranges": [
[
{
"gateway": "10.4.0.1",
"subnet": "10.4.0.0/24"
}
]
],
"routes": [
{
"dst": "0.0.0.0/0"
}
],
"type": "host-local"
}
},
{
"type": "portmap",
"capabilities": {
"portMappings": true
}
},
{
"type": "firewall",
"ingressPolicy": "same-bridge"
},
{
"type": "tuning"
}
]
},
"NerdctlID": "17f29b073143d8cd97b5bbe492bdeffec1c5fee55cc1fe2112c8b9335f8b6121",
"NerdctlLabels": {},
"File": "/etc/cni/net.d/nerdctl-bridge.conflist"
}
]
eth0 Link encap:Ethernet HWaddr 76:51:62:35:c4:d6
inet addr:10.4.0.220 Bcast:10.4.0.255 Mask:255.255.255.0
inet6 addr: fe80::7451:62ff:fe35:c4d6/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:182355 errors:0 dropped:0 overruns:0 frame:0
TX packets:1139 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:36961281 (36.9 MB) TX bytes:1461644 (1.4 MB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) 5.iptables --list Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:5000
ACCEPT tcp -- anywhere anywhere tcp dpt:6443
ACCEPT tcp -- anywhere anywhere tcp dpt:5000
ACCEPT tcp -- anywhere anywhere tcp dpt:5555
ACCEPT tcp -- anywhere anywhere tcp dpt:8787
ACCEPT tcp -- anywhere anywhere tcp dpt:7070
ACCEPT tcp -- anywhere anywhere tcp dpt:9090
ACCEPT tcp -- anywhere anywhere tcp dpt:9080
Chain FORWARD (policy DROP)
target prot opt source destination
CNI-ISOLATION-STAGE-1 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-FORWARD all -- anywhere anywhere /* CNI firewall plugin rules */
DOCKER-USER all -- anywhere anywhere
DOCKER-ISOLATION-STAGE-1 all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
DOCKER all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
DOCKER all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
DROP all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain CNI-ADMIN (1 references)
target prot opt source destination
Chain CNI-FORWARD (1 references)
target prot opt source destination
CNI-ADMIN all -- anywhere anywhere /* CNI firewall plugin admin overrides */
ACCEPT all -- anywhere 10.4.6.36 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.6.36 anywhere
ACCEPT all -- anywhere 10.4.0.177 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.0.177 anywhere
ACCEPT all -- anywhere 10.4.5.13 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.5.13 anywhere
ACCEPT all -- anywhere 10.4.0.220 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.0.220 anywhere
ACCEPT all -- anywhere 10.4.0.248 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.0.248 anywhere
Chain CNI-ISOLATION-STAGE-1 (1 references)
target prot opt source destination
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain CNI-ISOLATION-STAGE-2 (5 references)
target prot opt source destination
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain DOCKER (2 references)
target prot opt source destination
Chain DOCKER-ISOLATION-STAGE-1 (1 references)
target prot opt source destination
DOCKER-ISOLATION-STAGE-2 all -- anywhere anywhere
DOCKER-ISOLATION-STAGE-2 all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain DOCKER-ISOLATION-STAGE-2 (2 references)
target prot opt source destination
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain DOCKER-USER (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere Thank you for your patience. |
Beta Was this translation helpful? Give feedback.
-
iptables --list Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:5000
ACCEPT tcp -- anywhere anywhere tcp dpt:6443
ACCEPT tcp -- anywhere anywhere tcp dpt:5000
ACCEPT tcp -- anywhere anywhere tcp dpt:5555
ACCEPT tcp -- anywhere anywhere tcp dpt:8787
ACCEPT tcp -- anywhere anywhere tcp dpt:7070
ACCEPT tcp -- anywhere anywhere tcp dpt:9090
ACCEPT tcp -- anywhere anywhere tcp dpt:9080
Chain FORWARD (policy DROP)
target prot opt source destination
CNI-ISOLATION-STAGE-1 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-FORWARD all -- anywhere anywhere /* CNI firewall plugin rules */
DOCKER-USER all -- anywhere anywhere
DOCKER-ISOLATION-STAGE-1 all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
DOCKER all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
DOCKER all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
DROP all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain CNI-ADMIN (1 references)
target prot opt source destination
Chain CNI-FORWARD (1 references)
target prot opt source destination
CNI-ADMIN all -- anywhere anywhere /* CNI firewall plugin admin overrides */
ACCEPT all -- anywhere 10.4.6.36 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.6.36 anywhere
ACCEPT all -- anywhere 10.4.0.177 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.0.177 anywhere
ACCEPT all -- anywhere 10.4.5.13 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.5.13 anywhere
ACCEPT all -- anywhere 10.4.0.220 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.0.220 anywhere
ACCEPT all -- anywhere 10.4.0.248 ctstate RELATED,ESTABLISHED
ACCEPT all -- 10.4.0.248 anywhere
Chain CNI-ISOLATION-STAGE-1 (1 references)
target prot opt source destination
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2 all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain CNI-ISOLATION-STAGE-2 (5 references)
target prot opt source destination
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN all -- anywhere anywhere /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain DOCKER (2 references)
target prot opt source destination
Chain DOCKER-ISOLATION-STAGE-1 (1 references)
target prot opt source destination
DOCKER-ISOLATION-STAGE-2 all -- anywhere anywhere
DOCKER-ISOLATION-STAGE-2 all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain DOCKER-ISOLATION-STAGE-2 (2 references)
target prot opt source destination
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain DOCKER-USER (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere |
Beta Was this translation helpful? Give feedback.
-
Would you mind to run |
Beta Was this translation helpful? Give feedback.
-
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
DOCKER all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
CNI-HOSTPORT-DNAT all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
DOCKER all -- 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL
CNI-HOSTPORT-DNAT all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
CNI-HOSTPORT-MASQ all -- 0.0.0.0/0 0.0.0.0/0 /* CNI portfwd requiring masquerade */
MASQUERADE all -- 172.17.0.0/16 0.0.0.0/0
MASQUERADE all -- 172.18.0.0/16 0.0.0.0/0
CNI-a1a3b970ea04ce30791623c1 all -- 10.4.0.175 0.0.0.0/0 /* name: "bridge" id: "default-75b42901743ecabc618466d8de2d5dae720aa2d2698a9f1e48506b5787b4ecbe" */
CNI-44f68401e6e809c86f532dd0 all -- 10.4.0.176 0.0.0.0/0 /* name: "bridge" id: "default-aa9efba258745f1516bd681723c041c29470b32f53961656a1d4c4c315e48fee" */
CNI-25cc9d1fb9cca5dfa023b5b1 all -- 10.4.6.36 0.0.0.0/0 /* name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */
CNI-f6dc221730d77da4fcbf8bee all -- 10.4.2.3 0.0.0.0/0 /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
CNI-f6dc221730d77da4fcbf8bee all -- 10.4.2.4 0.0.0.0/0 /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
CNI-e051b4354002202cf9ffdb52 all -- 10.4.0.177 0.0.0.0/0 /* name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */
CNI-5618f94c5ce1b0733977592c all -- 10.4.5.13 0.0.0.0/0 /* name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */
CNI-f6dc221730d77da4fcbf8bee all -- 10.4.2.5 0.0.0.0/0 /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
CNI-b3f19f60df276d40982d25d1 all -- 10.4.0.178 0.0.0.0/0 /* name: "bridge" id: "default-c05943d4f3088bce0bcb8f0af55ba050573ec23e9381348f322b9bed01bc3537" */
CNI-11f221c81fd1454e05ef066c all -- 10.4.0.179 0.0.0.0/0 /* name: "bridge" id: "default-cd2ebd739f959754108fff033b0068a696ea6aa7dccb4d11b54926f6fbd152ef" */
CNI-cabbcdf2359934d8654c9443 all -- 10.4.4.2 0.0.0.0/0 /* name: "utorrent_default" id: "default-0e06555195caab62bafd28dba973433670005b871486619df08d902b44e29f7f" */
CNI-3e2786167eb469e112186ebc all -- 10.4.0.218 0.0.0.0/0 /* name: "bridge" id: "default-3d045b79d5a6a71d48baec99ab3a5989f69c7804591b47c477956a8e0f12c744" */
CNI-d2170d7c041eaf9aafda1faa all -- 10.4.0.219 0.0.0.0/0 /* name: "bridge" id: "default-f8393a3f6d51ea62224015f459736b8de8bd827533a25799da7258a12032d238" */
CNI-e75ab7614e7b86cfb175ebc9 all -- 10.4.0.220 0.0.0.0/0 /* name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.221 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.222 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.223 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.224 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.225 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.226 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.227 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.228 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.229 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.230 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.231 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.232 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.233 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.234 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.235 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.236 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.237 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.238 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.239 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.240 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.241 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.242 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.243 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.244 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.245 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.246 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a all -- 10.4.0.247 0.0.0.0/0 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-cde09b3b5a187c320e2b7701 all -- 10.4.0.248 0.0.0.0/0 /* name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */
Chain CNI-11f221c81fd1454e05ef066c (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-cd2ebd739f959754108fff033b0068a696ea6aa7dccb4d11b54926f6fbd152ef" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-cd2ebd739f959754108fff033b0068a696ea6aa7dccb4d11b54926f6fbd152ef" */
Chain CNI-25cc9d1fb9cca5dfa023b5b1 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.6.0/24 /* name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */
Chain CNI-3e2786167eb469e112186ebc (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-3d045b79d5a6a71d48baec99ab3a5989f69c7804591b47c477956a8e0f12c744" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-3d045b79d5a6a71d48baec99ab3a5989f69c7804591b47c477956a8e0f12c744" */
Chain CNI-44f68401e6e809c86f532dd0 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-aa9efba258745f1516bd681723c041c29470b32f53961656a1d4c4c315e48fee" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-aa9efba258745f1516bd681723c041c29470b32f53961656a1d4c4c315e48fee" */
Chain CNI-5618f94c5ce1b0733977592c (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.5.0/24 /* name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */
Chain CNI-DN-25cc9d1fb9cca5dfa023b (1 references)
target prot opt source destination
CNI-HOSTPORT-SETMARK tcp -- 10.4.6.0/24 0.0.0.0/0 tcp dpt:5555
CNI-HOSTPORT-SETMARK tcp -- 127.0.0.1 0.0.0.0/0 tcp dpt:5555
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5555 to:10.4.6.36:3000
Chain CNI-DN-5618f94c5ce1b07339775 (1 references)
target prot opt source destination
CNI-HOSTPORT-SETMARK tcp -- 10.4.5.0/24 0.0.0.0/0 tcp dpt:7070
CNI-HOSTPORT-SETMARK tcp -- 127.0.0.1 0.0.0.0/0 tcp dpt:7070
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7070 to:10.4.5.13:9090
Chain CNI-DN-cde09b3b5a187c320e2b7 (1 references)
target prot opt source destination
CNI-HOSTPORT-SETMARK tcp -- 10.4.0.0/24 0.0.0.0/0 tcp dpt:8787
CNI-HOSTPORT-SETMARK tcp -- 127.0.0.1 0.0.0.0/0 tcp dpt:8787
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8787 to:10.4.0.248:8787
Chain CNI-DN-e051b4354002202cf9ffd (1 references)
target prot opt source destination
CNI-HOSTPORT-SETMARK tcp -- 10.4.0.0/24 0.0.0.0/0 tcp dpt:9090
CNI-HOSTPORT-SETMARK tcp -- 127.0.0.1 0.0.0.0/0 tcp dpt:9090
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 to:10.4.0.177:8080
Chain CNI-DN-e75ab7614e7b86cfb175e (2 references)
target prot opt source destination
CNI-HOSTPORT-SETMARK tcp -- 10.4.0.0/24 0.0.0.0/0 tcp dpt:9080
CNI-HOSTPORT-SETMARK tcp -- 127.0.0.1 0.0.0.0/0 tcp dpt:9080
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9080 to:10.4.0.220:8080
CNI-HOSTPORT-SETMARK tcp -- 10.4.0.0/24 0.0.0.0/0 tcp dpt:7881
CNI-HOSTPORT-SETMARK tcp -- 127.0.0.1 0.0.0.0/0 tcp dpt:7881
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7881 to:10.4.0.220:6881
CNI-HOSTPORT-SETMARK udp -- 10.4.0.0/24 0.0.0.0/0 udp dpt:7881
CNI-HOSTPORT-SETMARK udp -- 127.0.0.1 0.0.0.0/0 udp dpt:7881
DNAT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:7881 to:10.4.0.220:6881
Chain CNI-HOSTPORT-DNAT (2 references)
target prot opt source destination
CNI-DN-25cc9d1fb9cca5dfa023b tcp -- 0.0.0.0/0 0.0.0.0/0 /* dnat name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */ multiport dports 5555
CNI-DN-e051b4354002202cf9ffd tcp -- 0.0.0.0/0 0.0.0.0/0 /* dnat name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */ multiport dports 9090
CNI-DN-5618f94c5ce1b07339775 tcp -- 0.0.0.0/0 0.0.0.0/0 /* dnat name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */ multiport dports 7070
CNI-DN-e75ab7614e7b86cfb175e tcp -- 0.0.0.0/0 0.0.0.0/0 /* dnat name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */ multiport dports 9080,7881
CNI-DN-e75ab7614e7b86cfb175e udp -- 0.0.0.0/0 0.0.0.0/0 /* dnat name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */ multiport dports 7881
CNI-DN-cde09b3b5a187c320e2b7 tcp -- 0.0.0.0/0 0.0.0.0/0 /* dnat name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */ multiport dports 8787
Chain CNI-HOSTPORT-MASQ (1 references)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 mark match 0x2000/0x2000
Chain CNI-HOSTPORT-SETMARK (14 references)
target prot opt source destination
MARK all -- 0.0.0.0/0 0.0.0.0/0 /* CNI portfwd masquerade mark */ MARK or 0x2000
Chain CNI-a1a3b970ea04ce30791623c1 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-75b42901743ecabc618466d8de2d5dae720aa2d2698a9f1e48506b5787b4ecbe" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-75b42901743ecabc618466d8de2d5dae720aa2d2698a9f1e48506b5787b4ecbe" */
Chain CNI-b3f19f60df276d40982d25d1 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-c05943d4f3088bce0bcb8f0af55ba050573ec23e9381348f322b9bed01bc3537" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-c05943d4f3088bce0bcb8f0af55ba050573ec23e9381348f322b9bed01bc3537" */
Chain CNI-cabbcdf2359934d8654c9443 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.4.0/24 /* name: "utorrent_default" id: "default-0e06555195caab62bafd28dba973433670005b871486619df08d902b44e29f7f" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "utorrent_default" id: "default-0e06555195caab62bafd28dba973433670005b871486619df08d902b44e29f7f" */
Chain CNI-cde09b3b5a187c320e2b7701 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */
Chain CNI-d2170d7c041eaf9aafda1faa (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-f8393a3f6d51ea62224015f459736b8de8bd827533a25799da7258a12032d238" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-f8393a3f6d51ea62224015f459736b8de8bd827533a25799da7258a12032d238" */
Chain CNI-e051b4354002202cf9ffdb52 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */
Chain CNI-e4eacdf53789f7f4a4a8008a (27 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
Chain CNI-e75ab7614e7b86cfb175ebc9 (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.0.0/24 /* name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */
Chain CNI-f6dc221730d77da4fcbf8bee (3 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 10.4.2.0/24 /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
MASQUERADE all -- 0.0.0.0/0 !224.0.0.0/4 /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
Chain DOCKER (2 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0
RETURN all -- 0.0.0.0/0 0.0.0.0/0 |
Beta Was this translation helpful? Give feedback.
-
Seems you have Docker on your machine. I think there would be rule conflict here
|
Beta Was this translation helpful? Give feedback.
-
We find the same problem when nerdctl installed in a host with docker |
Beta Was this translation helpful? Give feedback.
-
I think the root cause has been figured out. I will close the issue first. Feel free to reopen it if you have any problems |
Beta Was this translation helpful? Give feedback.
-
The reason is that docker will modify the default strategy of FORWARD: https://docs.docker.com/network/packet-filtering-firewalls/#docker-on-a-router |
Beta Was this translation helpful? Give feedback.
Seems you have Docker on your machine. I think there would be rule conflict here