Thanks a lot.
After iptables -F, it started working. :)
On Sat, Mar 28, 2015 at 8:25 PM, Marius Cornea <marius(a)remote-lab.net>
wrote:
Try adding the rule manually for your webserver
iptables -I INPUT -p tcp --dport 30001 -j ACCEPT
Depending on what you want to use you can add it to the settings:
/etc/sysconfig/iptables for the iptables service or /etc/firewalld/
for firewalld. For sake of debugging you could also use 'iptables -F'
to delete all rules.
On Sat, Mar 28, 2015 at 3:46 PM, Vedsar Kushwaha
<vedsarkushwaha(a)gmail.com> wrote:
> New iptables -nL (for computer B)
>
> Chain INPUT (policy ACCEPT)
> target prot opt source destination
> ACCEPT tcp -- 192.168.0.20 0.0.0.0/0 multiport
> dports 5671,5672 /* 001 amqp incoming amqp_192.168.0.20 */
> ACCEPT tcp -- 192.168.0.19 0.0.0.0/0 multiport
> dports 5666 /* 001 nagios-nrpe incoming nagios_nrpe */
> ACCEPT udp -- 192.168.0.19 0.0.0.0/0 multiport
> dports 4789 /* 001 neutron tunnel port incoming
> neutron_tunnel_192.168.0.20_192.168.0.19 */
> ACCEPT tcp -- 192.168.0.19 0.0.0.0/0 multiport
> dports 5900:5999 /* 001 nova compute incoming nova_compute */
> ACCEPT tcp -- 192.168.0.20 0.0.0.0/0 multiport
> dports 16509,49152:49215 /* 001 nova qemu migration incoming
> nova_qemu_migration_192.168.0.20_192.168.0.20 */
> ACCEPT tcp -- 192.168.0.21 0.0.0.0/0 multiport
> dports 16509,49152:49215 /* 001 nova qemu migration incoming
> nova_qemu_migration_192.168.0.20_192.168.0.21 */
> ACCEPT tcp -- 192.168.0.22 0.0.0.0/0 multiport
> dports 16509,49152:49215 /* 001 nova qemu migration incoming
> nova_qemu_migration_192.168.0.20_192.168.0.22 */
> ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
> ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
> ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
> ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:67
> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state
> RELATED,ESTABLISHED
> ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
> ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW
tcp
> dpt:22
> REJECT all -- 0.0.0.0/0 0.0.0.0/0
reject-with
> icmp-host-prohibited
>
> Chain FORWARD (policy ACCEPT)
> target prot opt source destination
> ACCEPT all -- 0.0.0.0/0 192.168.122.0/24 ctstate
> RELATED,ESTABLISHED
> ACCEPT all -- 192.168.122.0/24 0.0.0.0/0
> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
> REJECT all -- 0.0.0.0/0 0.0.0.0/0
reject-with
> icmp-port-unreachable
> REJECT all -- 0.0.0.0/0 0.0.0.0/0
reject-with
> icmp-port-unreachable
> REJECT all -- 0.0.0.0/0 0.0.0.0/0
reject-with
> icmp-host-prohibited
>
> Chain OUTPUT (policy ACCEPT)
> target prot opt source destination
>
>
> One more question, I'm on Centos7 using openstack juno:
>
> When starting firewalld, (service firewalld start) iptable stopped.
> Similarly, when iptables starts (service iptables start), firewalld gets
> stopped.
>
>
>
> On Sat, Mar 28, 2015 at 7:49 PM, Vedsar Kushwaha <
vedsarkushwaha(a)gmail.com>
> wrote:
>>
>> I'm using curl to access to the HTTPSEEVER.
>>
>> python -m SimpleHTTPServer 30001
>>
>>
>> iptables -nL
>>
>> target prot opt source destination
>> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate
>> RELATED,ESTABLISHED
>> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
>> INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
>> INPUT_ZONES_SOURCE all -- 0.0.0.0/0 0.0.0.0/0
>> INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
>> ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
>> REJECT all -- 0.0.0.0/0 0.0.0.0/0
reject-with
>> icmp-host-prohibited
>>
>> Chain FORWARD (policy ACCEPT)
>> target prot opt source destination
>> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate
>> RELATED,ESTABLISHED
>> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
>> FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
>> FORWARD_IN_ZONES_SOURCE all -- 0.0.0.0/0 0.0.0.0/0
>> FORWARD_IN_ZONES all -- 0.0.0.0/0 0.0.0.0/0
>> FORWARD_OUT_ZONES_SOURCE all -- 0.0.0.0/0 0.0.0.0/0
>> FORWARD_OUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
>> ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
>> REJECT all -- 0.0.0.0/0 0.0.0.0/0
reject-with
>> icmp-host-prohibited
>>
>> Chain OUTPUT (policy ACCEPT)
>> target prot opt source destination
>> OUTPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
>>
>> Chain FORWARD_IN_ZONES (1 references)
>> target prot opt source destination
>> FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
>> FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
>>
>> Chain FORWARD_IN_ZONES_SOURCE (1 references)
>> target prot opt source destination
>>
>> Chain FORWARD_OUT_ZONES (1 references)
>> target prot opt source destination
>> FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
>> FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
>>
>> Chain FORWARD_OUT_ZONES_SOURCE (1 references)
>> target prot opt source destination
>>
>> Chain FORWARD_direct (1 references)
>> target prot opt source destination
>>
>> Chain FWDI_public (2 references)
>> target prot opt source destination
>> FWDI_public_log all -- 0.0.0.0/0 0.0.0.0/0
>> FWDI_public_deny all -- 0.0.0.0/0 0.0.0.0/0
>> FWDI_public_allow all -- 0.0.0.0/0 0.0.0.0/0
>>
>> Chain FWDI_public_allow (1 references)
>> target prot opt source destination
>>
>> Chain FWDI_public_deny (1 references)
>> target prot opt source destination
>>
>> Chain FWDI_public_log (1 references)
>> target prot opt source destination
>>
>> Chain FWDO_public (2 references)
>> target prot opt source destination
>> FWDO_public_log all -- 0.0.0.0/0 0.0.0.0/0
>> FWDO_public_deny all -- 0.0.0.0/0 0.0.0.0/0
>> FWDO_public_allow all -- 0.0.0.0/0 0.0.0.0/0
>>
>> Chain FWDO_public_allow (1 references)
>> target prot opt source destination
>>
>> Chain FWDO_public_deny (1 references)
>> target prot opt source destination
>>
>> Chain FWDO_public_log (1 references)
>> target prot opt source destination
>>
>> Chain INPUT_ZONES (1 references)
>> target prot opt source destination
>> IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
>> IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
>>
>> Chain INPUT_ZONES_SOURCE (1 references)
>> target prot opt source destination
>>
>> Chain INPUT_direct (1 references)
>> target prot opt source destination
>>
>> Chain IN_public (2 references)
>> target prot opt source destination
>> IN_public_log all -- 0.0.0.0/0 0.0.0.0/0
>> IN_public_deny all -- 0.0.0.0/0 0.0.0.0/0
>> IN_public_allow all -- 0.0.0.0/0 0.0.0.0/0
>>
>> Chain IN_public_allow (1 references)
>> target prot opt source destination
>> ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp
dpt:22
>> ctstate NEW
>>
>> Chain IN_public_deny (1 references)
>> target prot opt source destination
>>
>> Chain IN_public_log (1 references)
>> target prot opt source destination
>>
>> Chain OUTPUT_direct (1 references)
>> target prot opt source destination
>>
>> On Sat, Mar 28, 2015 at 6:57 PM, Marius Cornea <marius(a)remote-lab.net>
>> wrote:
>>>
>>> iptables -nL ?
>>>
>>> Also it's not clear to me when you get the 'No route to host'
message.
>>> How are you trying to access it?
>>>
>>> On Sat, Mar 28, 2015 at 2:23 PM, Vedsar Kushwaha
>>> <vedsarkushwaha(a)gmail.com> wrote:
>>> > firewall is disable on all computers :)
>>> >
>>> > Redirecting to /bin/systemctl status firewalld.service
>>> > firewalld.service - firewalld - dynamic firewall daemon
>>> > Loaded: loaded (/usr/lib/systemd/system/firewalld.service;
disabled)
>>> > Active: inactive (dead)
>>> >
>>> >
>>> > On Sat, Mar 28, 2015 at 6:35 PM, Marius Cornea <
marius(a)remote-lab.net>
>>> > wrote:
>>> >>
>>> >> Hi,
>>> >>
>>> >> It sounds to me like a firewall issue. Please check the firewall
rules
>>> >> on computer B and make sure you allow HTTP access from the
clients.
>>> >>
>>> >> Tnx,
>>> >> Marius
>>> >>
>>> >> On Sat, Mar 28, 2015 at 1:43 PM, Vedsar Kushwaha
>>> >> <vedsarkushwaha(a)gmail.com> wrote:
>>> >> > I installed openstack --allinone on one computer (Say A).
>>> >> >
>>> >> > Then, I added two more compute nodes(Say B and C) on this.
>>> >> >
>>> >> > Everything is working fine.
>>> >> >
>>> >> > But now, for some other reason I want to start HTTPServer on
>>> >> > computer B
>>> >> > and
>>> >> > access it from computer X and Y which are different from A,B
& C.
>>> >> >
>>> >> > Now after running HTTPServer on computer B, I'm not able
to access
>>> >> > it
>>> >> > from
>>> >> > computer X and Y.
>>> >> > Giving Error 'No route to host'
>>> >> >
>>> >> > Although from computer B, I can access HTTPServer of computer
B.
>>> >> >
>>> >> >
>>> >> > Please help.
>>> >> >
>>> >> > --
>>> >> > Vedsar Kushwaha
>>> >> > M.Tech-Computational Science
>>> >> > Indian Institute of Science
>>> >> >
>>> >> > _______________________________________________
>>> >> > Rdo-list mailing list
>>> >> > Rdo-list(a)redhat.com
>>> >> >
https://www.redhat.com/mailman/listinfo/rdo-list
>>> >> >
>>> >> > To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>>> >
>>> >
>>> >
>>> >
>>> > --
>>> > Vedsar Kushwaha
>>> > M.Tech-Computational Science
>>> > Indian Institute of Science
>>
>>
>>
>>
>> --
>> Vedsar Kushwaha
>> M.Tech-Computational Science
>> Indian Institute of Science
>
>
>
>
> --
> Vedsar Kushwaha
> M.Tech-Computational Science
> Indian Institute of Science
--
Vedsar Kushwaha
M.Tech-Computational Science
Indian Institute of Science