Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ssh -v -l ec2-user -i PaasBBVA.pem 52.88.176.74
- OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: /etc/ssh/ssh_config line 56: Applying options for *
- debug1: Connecting to 52.88.176.74 [52.88.176.74] port 22.
- debug1: Connection established.
- debug1: permanently_set_uid: 0/0
- debug1: identity file PaasBBVA.pem type -1
- debug1: identity file PaasBBVA.pem-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6.1
- ssh_exchange_identification: read: Connection reset by peer
- [root@ip-172-31-33-98 ec2-user]# ssh -v -l ec2-user -i PaasBBVA.pem ip-172-31-41-20.us-west-2.compute.internal
- OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: /etc/ssh/ssh_config line 56: Applying options for *
- debug1: Connecting to ip-172-31-41-20.us-west-2.compute.internal [172.31.41.20] port 22.
- debug1: Connection established.
- debug1: permanently_set_uid: 0/0
- debug1: identity file PaasBBVA.pem type -1
- debug1: identity file PaasBBVA.pem-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6.1
- ssh_exchange_identification: read: Connection reset by peer
- [root@ip-172-31-33-98 ec2-user]# ssh -v -l ec2-user -i PaasBBVA.pem 172.31.41.20
- OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: /etc/ssh/ssh_config line 56: Applying options for *
- debug1: Connecting to 172.31.41.20 [172.31.41.20] port 22.
- debug1: Connection established.
- debug1: permanently_set_uid: 0/0
- debug1: identity file PaasBBVA.pem type -1
- debug1: identity file PaasBBVA.pem-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6.1
- ssh_exchange_identification: read: Connection reset by peer
- [root@ip-172-31-33-98 ec2-user]# ssh -v -l ec2-user -i PaasBBVA.pem ec2-52-88-176-74.us-west-2.compute.amazonaws.com
- OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: /etc/ssh/ssh_config line 56: Applying options for *
- debug1: Connecting to ec2-52-88-176-74.us-west-2.compute.amazonaws.com [172.31.41.20] port 22.
- debug1: Connection established.
- debug1: permanently_set_uid: 0/0
- debug1: identity file PaasBBVA.pem type -1
- debug1: identity file PaasBBVA.pem-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6.1
- ssh_exchange_identification: read: Connection reset by peer
- [root@ip-172-31-33-98 ec2-user]# iptables -L -n
- Chain INPUT (policy ACCEPT)
- target prot opt source destination
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
- ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
- OS_FIREWALL_ALLOW all -- 0.0.0.0/0 0.0.0.0/0
- REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
- Chain FORWARD (policy ACCEPT)
- target prot opt source destination
- DOCKER-ISOLATION all -- 0.0.0.0/0 0.0.0.0/0
- DOCKER all -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
- REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
- Chain OUTPUT (policy ACCEPT)
- target prot opt source destination
- Chain DOCKER (1 references)
- target prot opt source destination
- Chain DOCKER-ISOLATION (1 references)
- target prot opt source destination
- RETURN all -- 0.0.0.0/0 0.0.0.0/0
- Chain OS_FIREWALL_ALLOW (1 references)
- target prot opt source destination
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2049
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:4001
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8443
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8444
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8053
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:8053
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:24224
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:24224
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2224
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:5404
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:5405
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:9090
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:10250
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:10255
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:10255
- ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:4789
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2379
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2380
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:9000
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2224
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2224
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:24224
- [root@ip-172-31-33-98 ec2-user]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement