Guest User

Untitled

a guest
Jun 22nd, 2018
101
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.59 KB | None | 0 0
  1. sudo firewall-cmd --add-port=80/tcp --permanent
  2.  
  3. target: default
  4. icmp-block-inversion: no
  5. interfaces: ens192
  6. sources:
  7. services: dhcpv6-client ssh http https
  8. ports: 80/tcp 443/tcp 8000/tcp
  9. protocols:
  10. masquerade: no
  11. forward-ports:
  12. source-ports:
  13. icmp-blocks:
  14. rich rules:
  15.  
  16. sudo nmap -sT {ip address}
  17.  
  18. PORT STATE SERVICE
  19. 22/tcp open ssh
  20. 443/tcp closed https
  21.  
  22. sudo netstat -tulpn
  23.  
  24. Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
  25. tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 17859/nginx: master
  26. tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1263/sshd
  27. tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN 12372/postgres
  28. tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1766/master
  29. tcp6 0 0 :::80 :::* LISTEN 17859/nginx: master
  30. tcp6 0 0 :::22 :::* LISTEN 1263/sshd
  31. tcp6 0 0 ::1:5432 :::* LISTEN 12372/postgres
  32. tcp6 0 0 ::1:25 :::* LISTEN 1766/master
  33. udp 0 0 127.0.0.1:323 0.0.0.0:* 867/chronyd
  34. udp6 0 0 ::1:323 :::* 867/chronyd
  35.  
  36. sudo ufw status verbose
  37.  
  38. Status: inactive
  39.  
  40. sestatus
  41.  
  42. SELinux status: disabled
Add Comment
Please, Sign In to add comment