![]() Use netstat to print a list of processes that are actively listening for TCP connections: sudo netstat -tlpnĮxample results: Active Internet connections (only servers) To install them: sudo apt-get install net-tools nmap In this section we will use netstat and nmap to check for local processes that are listening for TCP connections and to scan ports. But in this case, let's dive right into how to check if your services are exposed remotely. I usually begin articles, like this one, by explaining some history or back-story to provide context. In this article, I will explain how to check if the services running on your server are exposed and how to protect them. Docker modifies iptables rules to completely bypass or ignore the rules set by ufw. Are you running a firewall like ufw with docker? You might be surprised to learn that your firewall is probably not doing anything to block unwanted internet traffic from reaching your docker services.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |