Sponsored Content
Full Discussion: iptables: forwarding a port
Top Forums UNIX for Dummies Questions & Answers iptables: forwarding a port Post 43824 by meeps on Sunday 23rd of November 2003 02:37:02 AM
Old 11-23-2003
I found out that I could have Apache listen on multiple ports so my problem is technically solved.

I'm still interest to find a solution to this past problem using iptables though, never know what software won't listen on multiple ports in the future.

Thanks
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

port forwarding

Hi, I have to install an application that has a built in tftp server. Tftp comes in on port 69. As i am not installing this application as a root user i am running into trouble because only the root user can listen to ports < 1024. So changing the port i listen to to one greater than 1023 isn't... (1 Reply)
Discussion started by: imloaded24_7
1 Replies

2. UNIX for Advanced & Expert Users

Port forwarding

Hi I want to set up port forwarding from one network to another network. I already have this configured on the Linux box using iptables. iptables -t nat -A PREROUTING -p tcp -i eth1 --dport 1521 -j DNAT --to 10.218.146.230 iptables -A FORWARD -p tcp -i eth1 -d 10.218.146.230 -j ACCEPT ... (2 Replies)
Discussion started by: slash_blog
2 Replies

3. Solaris

ip and port forwarding in Solaris 10

Hi; I have the following issue: I have a Solaris server running an old applications which connects to an http server in other server at certain port. The thing is that the http server has changed its ip and port and the addres in the app is hard coded and touching the app by now is out of the... (0 Replies)
Discussion started by: ppereira
0 Replies

4. IP Networking

SSH Port Forwarding - sharing the same port

Hi Linux/Unix Guru, I am setting Linux Hopping Station to another different servers. My current config to connect to another servers is using different port to connect. e.g ssh -D 1080 -p 22 username@server1.com ssh -D 1081 -p 22 username@server2.com Now what I would like to have... (3 Replies)
Discussion started by: regmaster
3 Replies

5. UNIX for Advanced & Expert Users

Iptable and port forwarding

Hello, I have a routeur linksys (192.168.1.1 ) a firewall (192.168.1.55 IN ----> 192.168.2.254 OUT) which using iptable I want to acces to an equipment (lorex video camera serveur 192.168.2.44) which using an ddns service on the port 9000 So i don t know which redirection a will do on the... (2 Replies)
Discussion started by: tapharule
2 Replies

6. IP Networking

iptables port forwarding does not work while I have 2 routes

Hi, On my linux server I have 2 routes: Code: nexthop via 123.201.254.5 dev eth0 weight 38 nexthop via 111.93.155.149 dev eth2 weight 36 I have a iptable rule like : iptables -t nat -A PREROUTING -p tcp -i eth0 -d... (5 Replies)
Discussion started by: ashokvpp
5 Replies

7. UNIX for Dummies Questions & Answers

Iptables, port forwarding, 64k connection limit?

I am having an issue with iptables. My server is a RHEL6 64bit system. In my application I have a large number of connected clients ~100k to a particular service. The application works fine when iptables is off, 100k clients are able to connect. However, when I turn iptables on and add a... (1 Reply)
Discussion started by: jtipp3tt
1 Replies

8. UNIX for Advanced & Expert Users

Help on port forwarding please..

Hi experts, We have windows machine ( A ) in one network & 2 Linux Servers ( B & C ) in another network. There is a firewall between these 2 networks and SSH (TCP/22) & HTTPS (TCP/443) are allowed from A to B only (but not to C). There is no personal firewall / iptables running on any machine.... (1 Reply)
Discussion started by: magnus29
1 Replies

9. IP Networking

Port Forwarding not working

Hello Gurus, I have configured port forwarding at router. But after configuration I am not able to connect the computer from outside/Over internet/Remote desktp from other computer. Could you please advice? Thanks- Pokhraj (2 Replies)
Discussion started by: pokhraj_d
2 Replies

10. Red Hat

iptables port forwarding

Hello All, I would like to ask you very kindly with /etc/sysconfig/iptables file I have to setup port forwarding on RHEL6 router. Users from public network must be able to ssh to servers in private network behind RHEL6 router. Problem is that servers in private network must be isolated. My... (2 Replies)
Discussion started by: oidipus
2 Replies
ovs-benchmark(1)						Open vSwitch Manual						  ovs-benchmark(1)

NAME
ovs-benchmark - flow setup benchmark utility for Open vSwitch SYNOPSIS
ovs-benchmark latency --remote ip[:ports] [--sockets nsocks] [--batches nbatches] [--local [ip][:ports]] ovs-benchmark rate --remote ip[:ports] [--max-rate rate] [--timeout maxsecs] [--sockets nsocks] [--batches nbatches] [--local [ip][:ports]] ovs-benchmark listen [--local [ip]:ports] ovs-benchmark help DESCRIPTION
ovs-benchmark tests the performance of Open vSwitch flow setup by setting up a number of TCP connections and measuring the time required. It can also be used with the Linux bridge or without any bridging software, which allows one to measure the bandwidth and latency cost of bridging. Each ovs-benchmark command is described separately below. The ``latency'' command This command initiates nsocks TCP connections (by default, 100) as quickly as possible, waits for each one to complete with success or failure, and prints a bar chart of completion times on standard output, followed by a summary line. Each line in the bar chart lists a time to connection completion in milliseconds followed by a number of . or ! symbols, one for each TCP connection that completed in that many milliseconds. A successful connection prints a ., and an unsuccessful connection (e.g. to a port on which no process is listening) prints a !. If nbatches is given, the entire procedure is repeated the specified number of times. Only a single summary line is printed at the end. Results vary widely based on the number of sockets and whether the remote host is listening for connections on the specified ports. With a small number of sockets, all connection times typically remain within a handful of milliseconds. As the number of sockets increases, the distribution of connection times clusters around the sending TCP stack's SYN retransmission interval. (This pattern occurs with or without Open vSwitch on the network path.) The ``rate'' command This command initiates nsocks TCP connections (by default, 100) as quickly as possible (limited by maxrate, if --max-rate is specified). Each time a connection completes with success or failure, it closes that connection and initiates a new one. It continues to do so either forever or, if --timeout is specified, until maxsecs seconds have elapsed. During the test, it prints statistics about time elapsed, suc- cessful and unsuccessful connections, and the average number of completed (succeeded or failed) connections per second over the run. Without --max-rate, the rate command measures the maximum sustained flow setup rate for an Open vSwitch instance. This naturally tends to drive ovs-vswitchd CPU usage to 100% on the host receiving the traffic. When --max-rate is specified with a value below the maximum rate that an Open vSwitch instance can handle, then rate can also be used to measure the kernel and userspace CPU cost of flow setups at specific flow rates. Results tend to fluctuate greatly for the first few seconds of a run, then settle down. The displayed average is calculated over the entire run and so tends to converge asymptotically on the ``correct'' value. To converge more quickly, try running for 5 to 10 seconds, then killing and restarting the run. The ``listen'' command This command listens on one or more TCP ports for incoming connections. It accepts connections and immediately closes them. It can be paired with the rate or latency commands for observing effects of successful vs. unsuccessful TCP connections. It is easier to reproduce and interpret ovs-benchmark results when there is no listener (see NOTES below). The ``help'' command Prints a usage message and exits successfully. OPTIONS
-r ip[:ports] --remote ip[:ports] This option, required on latency and rate commands, minimally specifies the remote host to connect to (as an IP address or DNS name) as ip. A TCP port or range of ports (separated by -) may also be specified. If a range is specified then each port in the range is used in round-robin order. The default port is 6630 if none is specified. -l [ip][:ports] --local [ip][:ports] On the latency and rate, without this option, outgoing connections will not bind a specific TCP port. The local TCP stack will pick a local TCP port to bind. When this option is specified, the specified port or range of ports will be used in turn. (If a port range is specified on both --local and --remote, then each local port in its range will be used before the remote port is incre- mented to the next port in its range.) On the listen command, this option specifies the local port or ports and IP addresses on which to listen. If it is omitted, port 6630 on any IP address is used. -s nsocks --sockets nsocks For latency, sets the number of connections to initiate per batch. For rate, sets the number of outstanding connections attempts to maintain at any given time. The default is 100. -b nbatches --batches nbatches For latency, sets the number of times to initiate and wait for all of the connections to complete. The default is 1. -c maxrate --max-rate maxrate For rate, caps the maximum rate at which connections will be attempted to maxrate connections per second. By default there is no limit. -T maxsecs --timeout maxsecs For rate, stops the benchmark after maxsecs seconds have elapsed. By default, the benchmark continues until interrupted by a sig- nal. NOTES
ovs-benchmark uses standard POSIX socket calls for network access, so it shares the strengths and limitations of TCP/IP and its implementa- tions in the local and remote TCP/IP stacks. Particularly, TCP and its implementations limit the number of successfully completed and then closed TCP connections. This means that ovs-benchmark tests tend to slow down if run for long intervals or with large numbers of sockets or batches, if the remote system is listening on the port or ports being contacted. The problem does not occur when the remote system is not listening. ovs-benchmark results are therefore much more reliable and repeatable when the remote system is not listening on the port or ports being contacted. Even a single listening socket (e.g. range of ports 8000 to 9000 with one listener on port 8080) can cause anom- alies in results. Be sure that the remote TCP/IP stack's firewall allows the benchmark's traffic to be processed. For Open vSwitch benchmarking purposes, you might want to disable the firewall with, e.g., iptables -F. ovs-benchmark is single-threaded. A multithreaded process might be able to initiate connections more quickly. A TCP connection consists of two flows (one in each direction), so multiply the TCP connection statistics that ovs-benchmark reports by 2 to get flow statistics. Open vSwitch July 2011 ovs-benchmark(1)
All times are GMT -4. The time now is 08:19 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy