Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ iptables -t nat -L -n
- Chain PREROUTING (policy ACCEPT)
- target prot opt source destination
- DOCKER all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
- Chain INPUT (policy ACCEPT)
- target prot opt source destination
- Chain OUTPUT (policy ACCEPT)
- target prot opt source destination
- DOCKER all -- 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL
- Chain POSTROUTING (policy ACCEPT)
- target prot opt source destination
- MASQUERADE all -- 172.17.0.0/16 0.0.0.0/0
- MASQUERADE tcp -- 172.17.0.2 172.17.0.2 tcp dpt:10022
- MASQUERADE tcp -- 172.17.0.2 172.17.0.2 tcp dpt:443
- MASQUERADE tcp -- 172.17.0.2 172.17.0.2 tcp dpt:80
- MASQUERADE tcp -- 172.17.0.3 172.17.0.3 tcp dpt:10086
- Chain DOCKER (2 references)
- target prot opt source destination
- RETURN all -- 0.0.0.0/0 0.0.0.0/0
- DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:10022 to:172.17.0.2:10022
- DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 to:172.17.0.2:443
- DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 to:172.17.0.2:80
- DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:10086 to:172.17.0.3:10086
- $ sudo netstat -tapn|grep 10022
- tcp6 0 0 :::10022 :::* LISTEN 10849/docker-proxy
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement