
I'm not very good at IPtables configuration so I'm not sure where to begin my investigation. What I need is that any other IP than MyWorkIP is refused so my phone would not get access. I'm testing everything by trying to access the specific page:port from my work computer ( MyWorkIP in the script) and from my phone (dynamic IP) but any attempt grants me access from both devices.

Iptables -I INPUT -p tcp -s 0.0.0.0/0 -dport 5432 -j DROP Iptables -I INPUT -p tcp -s MyWorkIP -dport 5432 -j ACCEPT Iptables -I INPUT -p tcp -s 0.0.0.0/0 -dport 5601 -j DROP Iptables -I INPUT -p tcp -s MyWorkIP -dport 5601 -j ACCEPT Iptables -I INPUT -p tcp -s 0.0.0.0/0 -dport 9300 -j DROP Iptables -I INPUT -p tcp -s MyWorkIP -dport 9300 -j ACCEPT Iptables -I INPUT -p tcp -s 0.0.0.0/0 -dport 9200 -j DROP So an IP routing rule is created for the 172.17.x.x IP range which overrides the corrrect IP I want to access. You need to order a static IP address service from your provider, which will be available from the external Internet.

Your IP address doesnt exist on the Internet, its hidden behind a proxy server. On the Internet, youre going through your service providers proxy server.
HOW TO ALLOW DOCKER IP ADDRESSES IN CNTLM CONFIGURATION HOW TO
The Docker documentation on how to Control and Configure Docker with systemd tells you how to do this and is reproduced below. Figure 2, Docker daemon communicating with HTTP proxy. The parameters that you use depend on the launch type you choose for. Then I found the root cause is that, Docker is installed on my Linux VM which by default create a docker0 bridge with the IP range 172.17.x.x. You get an IP address inside your service providers network. In this case it is the Docker daemon configuration that needs to be modified. You can define multiple containers in a task definition.

Iptables -I INPUT -p tcp -s MyWorkIP -dport 9200 -j ACCEPT A task definition is required to run Docker containers in Amazon ECS. Please, Have a look at the output of your suggested workaround: it seems the issue is related to network or proxy configuration. For example, the following rule restricts external access from all IP addresses except 192.168.1.1: iptables -I DOCKER-USER -i extif -s 192.168.1. Note that this is the minimum required configuration for this field. Cloudera Data Science Workbench automatically appends the following list of IP addresses to the NOPROXY configuration. I've tried following instructions to allow only a specific IP for a port, but it seems that Docker overrides my rules: # ALLOW specific ports only on ONE IP address: To allow only a specific IP or network to access the containers, insert a negated rule at the top of the DOCKER-USER filter chain. add the Cntlm proxy address to the HTTP Proxy or HTTPS Proxy fields. For instance ElasticSearch expose by default it's plugin interface on port 9200.Īs the admin, I need to have access to these interfaces but I want to limit it to my work computer only. All components of this app are inside Docker containers, most of them only need to communicate between each other but not to the outside world (like PostgreSQL or ElasticSearch).
