-
| DescriptionI am using  version: '3.9'
services:
  utorrent:
    image: ekho/utorrent:latest
    volumes:
      - utorrent-settings:/utorrent/settings
      - /home/Data/data:/data
      - /home/Data/abs:/abs-path-dir
    environment:
      UID: 1000
      GID: 1000
      webui: ng
      dir_autoload_delete: true
      dir_download: subdir1,/abs-path-dir
    network_mode: bridge
    ports:
      - "9080:8080"
      - "7881:6881"
      - "7881:6881/udp"
    restart: always
    logging:
      driver: "json-file"
      options:
        max-size: "10m"
        max-file: "3"
volumes:
  utorrent-settings:After building and starting the container, i tried to access the webui from LAN, but can't get through. However, it is OK when i tried to access in the localhost. Steps to reproduce the issue
 Describe the results you received and expectedI want to access the exposed port of my containers from LAN in bridge mode. What version of nerdctl are you using?WARN[0000] unable to determine buildctl version: exec: "buildctl": executable file not found in $PATH Server: Are you using a variant of nerdctl? (e.g., Rancher Desktop)None Host informationClient: Server: WARNING: bridge-nf-call-iptables is disabled | 
Beta Was this translation helpful? Give feedback.
Replies: 16 comments 3 replies
-
| Would you mind providing the following Content: 
 | 
Beta Was this translation helpful? Give feedback.
-
| 
 
 
 | 
Beta Was this translation helpful? Give feedback.
-
| 
 Additionally, i can access the containers with host mode from LAN. | 
Beta Was this translation helpful? Give feedback.
-
| some extra steps that my help you : 
 by the way are you able to connect to other service in your PC (different from containers) from the LAN ? | 
Beta Was this translation helpful? Give feedback.
-
| 
 After i changed the container's network_mode to host, I can access the service from LAN using the same port. So i think the problem is with the bridge network_mode. | 
Beta Was this translation helpful? Give feedback.
-
| when a container is using a bridge network and exposing a port to be reached from the LAN, you need to add a firewall rule to allow traffic to the container. By default, incoming traffic from the LAN is blocked by the firewall on the host machine. When you expose a port on the container, you are allowing incoming traffic on that port to reach the container( bridge private network), but you still need to configure the firewall on the host machine to allow the traffic through. To allow incoming traffic on the exposed port, you can add a firewall rule to the INPUT chain of the iptables firewall on the host machine. The rule should allow incoming traffic on the port that you exposed in the container. This rule will add a new rule to the INPUT chain of the iptables firewall, allowing incoming TCP traffic on port 80. Replace "80" with the port number that you exposed in the container. Would you also please list you host firewall rules | 
Beta Was this translation helpful? Give feedback.
-
| 
 Sorry, I just check this. Looks like the socket  | 
Beta Was this translation helpful? Give feedback.
-
| 
 Thanks for the information I may have some guess about this issue base on the information 
 | 
Beta Was this translation helpful? Give feedback.
-
| 
 Thank you for your help, and i think maybe there is something wrong with my network configuration. 
 br-7ce369a500d0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.4.5.1  netmask 255.255.255.0  broadcast 10.4.5.255
        inet6 fe80::b83c:8dff:fecd:3719  prefixlen 64  scopeid 0x20<link>
        ether f6:f7:a9:cc:9a:4b  txqueuelen 1000  (Ethernet)
        RX packets 2394583  bytes 140209568 (133.7 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 146656  bytes 11225726 (10.7 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
br-93daabeac2b4: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.4.6.1  netmask 255.255.255.0  broadcast 10.4.6.255
        inet6 fe80::9857:1bff:fec1:25d5  prefixlen 64  scopeid 0x20<link>
        ether 7a:87:4c:ec:3c:43  txqueuelen 1000  (Ethernet)
        RX packets 223138  bytes 26691280 (25.4 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 252727  bytes 62600777 (59.7 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
enp3s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 114.212.xxx.xxx  netmask 255.255.248.0  broadcast 114.212.xxx.xxx
        inet6 fe80::56e1:adff:fef5:4291  prefixlen 64  scopeid 0x20<link>
        ether 54:e1:ad:f5:42:91  txqueuelen 1000  (Ethernet)
        RX packets 2236318534  bytes 2285112770255 (2.0 TiB)
        RX errors 0  dropped 16509  overruns 0  frame 0
        TX packets 1326974423  bytes 867532976245 (807.9 GiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
nerdctl0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.4.0.1  netmask 255.255.255.0  broadcast 10.4.0.255
        inet6 fe80::d8e5:a5ff:fe99:5d26  prefixlen 64  scopeid 0x20<link>
        ether 8e:d2:e9:89:55:a4  txqueuelen 1000  (Ethernet)
        RX packets 3573578  bytes 593810839 (566.3 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 1134745  bytes 482611238 (460.2 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
 [
    {
        "CNI": {
            "cniVersion": "1.0.0",
            "name": "bridge",
            "nerdctlID": "17f29b073143d8cd97b5bbe492bdeffec1c5fee55cc1fe2112c8b9335f8b6121",
            "nerdctlLabels": {},
            "plugins": [
                {
                    "type": "bridge",
                    "bridge": "nerdctl0",
                    "isGateway": true,
                    "ipMasq": true,
                    "hairpinMode": true,
                    "ipam": {
                        "ranges": [
                            [
                                {
                                    "gateway": "10.4.0.1",
                                    "subnet": "10.4.0.0/24"
                                }
                            ]
                        ],
                        "routes": [
                            {
                                "dst": "0.0.0.0/0"
                            }
                        ],
                        "type": "host-local"
                    }
                },
                {
                    "type": "portmap",
                    "capabilities": {
                        "portMappings": true
                    }
                },
                {
                    "type": "firewall",
                    "ingressPolicy": "same-bridge"
                },
                {
                    "type": "tuning"
                }
            ]
        },
        "NerdctlID": "17f29b073143d8cd97b5bbe492bdeffec1c5fee55cc1fe2112c8b9335f8b6121",
        "NerdctlLabels": {},
        "File": "/etc/cni/net.d/nerdctl-bridge.conflist"
    }
]
 eth0      Link encap:Ethernet  HWaddr 76:51:62:35:c4:d6  
          inet addr:10.4.0.220  Bcast:10.4.0.255  Mask:255.255.255.0
          inet6 addr: fe80::7451:62ff:fe35:c4d6/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:182355 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1139 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:36961281 (36.9 MB)  TX bytes:1461644 (1.4 MB)
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)5.iptables --list Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:5000
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:6443
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:5000
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:5555
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:8787
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:7070
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:9090
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:9080
Chain FORWARD (policy DROP)
target     prot opt source               destination         
CNI-ISOLATION-STAGE-1  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-FORWARD  all  --  anywhere             anywhere             /* CNI firewall plugin rules */
DOCKER-USER  all  --  anywhere             anywhere            
DOCKER-ISOLATION-STAGE-1  all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED
DOCKER     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED
DOCKER     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            
DROP       all  --  anywhere             anywhere            
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
Chain CNI-ADMIN (1 references)
target     prot opt source               destination         
Chain CNI-FORWARD (1 references)
target     prot opt source               destination         
CNI-ADMIN  all  --  anywhere             anywhere             /* CNI firewall plugin admin overrides */
ACCEPT     all  --  anywhere             10.4.6.36            ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.6.36            anywhere            
ACCEPT     all  --  anywhere             10.4.0.177           ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.0.177           anywhere            
ACCEPT     all  --  anywhere             10.4.5.13            ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.5.13            anywhere            
ACCEPT     all  --  anywhere             10.4.0.220           ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.0.220           anywhere            
ACCEPT     all  --  anywhere             10.4.0.248           ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.0.248           anywhere            
Chain CNI-ISOLATION-STAGE-1 (1 references)
target     prot opt source               destination         
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN     all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain CNI-ISOLATION-STAGE-2 (5 references)
target     prot opt source               destination         
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN     all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain DOCKER (2 references)
target     prot opt source               destination         
Chain DOCKER-ISOLATION-STAGE-1 (1 references)
target     prot opt source               destination         
DOCKER-ISOLATION-STAGE-2  all  --  anywhere             anywhere            
DOCKER-ISOLATION-STAGE-2  all  --  anywhere             anywhere            
RETURN     all  --  anywhere             anywhere            
Chain DOCKER-ISOLATION-STAGE-2 (2 references)
target     prot opt source               destination         
DROP       all  --  anywhere             anywhere            
DROP       all  --  anywhere             anywhere            
RETURN     all  --  anywhere             anywhere            
Chain DOCKER-USER (1 references)
target     prot opt source               destination         
RETURN     all  --  anywhere             anywhereThank you for your patience. | 
Beta Was this translation helpful? Give feedback.
-
| 
 iptables --list Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:5000
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:6443
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:5000
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:5555
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:8787
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:7070
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:9090
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:9080
Chain FORWARD (policy DROP)
target     prot opt source               destination         
CNI-ISOLATION-STAGE-1  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-FORWARD  all  --  anywhere             anywhere             /* CNI firewall plugin rules */
DOCKER-USER  all  --  anywhere             anywhere            
DOCKER-ISOLATION-STAGE-1  all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED
DOCKER     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED
DOCKER     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            
DROP       all  --  anywhere             anywhere            
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
Chain CNI-ADMIN (1 references)
target     prot opt source               destination         
Chain CNI-FORWARD (1 references)
target     prot opt source               destination         
CNI-ADMIN  all  --  anywhere             anywhere             /* CNI firewall plugin admin overrides */
ACCEPT     all  --  anywhere             10.4.6.36            ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.6.36            anywhere            
ACCEPT     all  --  anywhere             10.4.0.177           ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.0.177           anywhere            
ACCEPT     all  --  anywhere             10.4.5.13            ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.5.13            anywhere            
ACCEPT     all  --  anywhere             10.4.0.220           ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.0.220           anywhere            
ACCEPT     all  --  anywhere             10.4.0.248           ctstate RELATED,ESTABLISHED
ACCEPT     all  --  10.4.0.248           anywhere            
Chain CNI-ISOLATION-STAGE-1 (1 references)
target     prot opt source               destination         
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
CNI-ISOLATION-STAGE-2  all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN     all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain CNI-ISOLATION-STAGE-2 (5 references)
target     prot opt source               destination         
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
DROP       all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
RETURN     all  --  anywhere             anywhere             /* CNI firewall plugin rules (ingressPolicy: same-bridge) */
Chain DOCKER (2 references)
target     prot opt source               destination         
Chain DOCKER-ISOLATION-STAGE-1 (1 references)
target     prot opt source               destination         
DOCKER-ISOLATION-STAGE-2  all  --  anywhere             anywhere            
DOCKER-ISOLATION-STAGE-2  all  --  anywhere             anywhere            
RETURN     all  --  anywhere             anywhere            
Chain DOCKER-ISOLATION-STAGE-2 (2 references)
target     prot opt source               destination         
DROP       all  --  anywhere             anywhere            
DROP       all  --  anywhere             anywhere            
RETURN     all  --  anywhere             anywhere            
Chain DOCKER-USER (1 references)
target     prot opt source               destination         
RETURN     all  --  anywhere             anywhere | 
Beta Was this translation helpful? Give feedback.
-
| Would you mind to run  | 
Beta Was this translation helpful? Give feedback.
-
| Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         
DOCKER     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type LOCAL
CNI-HOSTPORT-DNAT  all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type LOCAL
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
DOCKER     all  --  0.0.0.0/0           !127.0.0.0/8          ADDRTYPE match dst-type LOCAL
CNI-HOSTPORT-DNAT  all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type LOCAL
Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         
CNI-HOSTPORT-MASQ  all  --  0.0.0.0/0            0.0.0.0/0            /* CNI portfwd requiring masquerade */
MASQUERADE  all  --  172.17.0.0/16        0.0.0.0/0           
MASQUERADE  all  --  172.18.0.0/16        0.0.0.0/0           
CNI-a1a3b970ea04ce30791623c1  all  --  10.4.0.175           0.0.0.0/0            /* name: "bridge" id: "default-75b42901743ecabc618466d8de2d5dae720aa2d2698a9f1e48506b5787b4ecbe" */
CNI-44f68401e6e809c86f532dd0  all  --  10.4.0.176           0.0.0.0/0            /* name: "bridge" id: "default-aa9efba258745f1516bd681723c041c29470b32f53961656a1d4c4c315e48fee" */
CNI-25cc9d1fb9cca5dfa023b5b1  all  --  10.4.6.36            0.0.0.0/0            /* name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */
CNI-f6dc221730d77da4fcbf8bee  all  --  10.4.2.3             0.0.0.0/0            /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
CNI-f6dc221730d77da4fcbf8bee  all  --  10.4.2.4             0.0.0.0/0            /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
CNI-e051b4354002202cf9ffdb52  all  --  10.4.0.177           0.0.0.0/0            /* name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */
CNI-5618f94c5ce1b0733977592c  all  --  10.4.5.13            0.0.0.0/0            /* name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */
CNI-f6dc221730d77da4fcbf8bee  all  --  10.4.2.5             0.0.0.0/0            /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
CNI-b3f19f60df276d40982d25d1  all  --  10.4.0.178           0.0.0.0/0            /* name: "bridge" id: "default-c05943d4f3088bce0bcb8f0af55ba050573ec23e9381348f322b9bed01bc3537" */
CNI-11f221c81fd1454e05ef066c  all  --  10.4.0.179           0.0.0.0/0            /* name: "bridge" id: "default-cd2ebd739f959754108fff033b0068a696ea6aa7dccb4d11b54926f6fbd152ef" */
CNI-cabbcdf2359934d8654c9443  all  --  10.4.4.2             0.0.0.0/0            /* name: "utorrent_default" id: "default-0e06555195caab62bafd28dba973433670005b871486619df08d902b44e29f7f" */
CNI-3e2786167eb469e112186ebc  all  --  10.4.0.218           0.0.0.0/0            /* name: "bridge" id: "default-3d045b79d5a6a71d48baec99ab3a5989f69c7804591b47c477956a8e0f12c744" */
CNI-d2170d7c041eaf9aafda1faa  all  --  10.4.0.219           0.0.0.0/0            /* name: "bridge" id: "default-f8393a3f6d51ea62224015f459736b8de8bd827533a25799da7258a12032d238" */
CNI-e75ab7614e7b86cfb175ebc9  all  --  10.4.0.220           0.0.0.0/0            /* name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.221           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.222           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.223           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.224           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.225           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.226           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.227           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.228           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.229           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.230           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.231           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.232           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.233           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.234           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.235           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.236           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.237           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.238           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.239           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.240           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.241           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.242           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.243           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.244           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.245           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.246           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-e4eacdf53789f7f4a4a8008a  all  --  10.4.0.247           0.0.0.0/0            /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
CNI-cde09b3b5a187c320e2b7701  all  --  10.4.0.248           0.0.0.0/0            /* name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */
Chain CNI-11f221c81fd1454e05ef066c (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-cd2ebd739f959754108fff033b0068a696ea6aa7dccb4d11b54926f6fbd152ef" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-cd2ebd739f959754108fff033b0068a696ea6aa7dccb4d11b54926f6fbd152ef" */
Chain CNI-25cc9d1fb9cca5dfa023b5b1 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.6.0/24          /* name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */
Chain CNI-3e2786167eb469e112186ebc (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-3d045b79d5a6a71d48baec99ab3a5989f69c7804591b47c477956a8e0f12c744" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-3d045b79d5a6a71d48baec99ab3a5989f69c7804591b47c477956a8e0f12c744" */
Chain CNI-44f68401e6e809c86f532dd0 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-aa9efba258745f1516bd681723c041c29470b32f53961656a1d4c4c315e48fee" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-aa9efba258745f1516bd681723c041c29470b32f53961656a1d4c4c315e48fee" */
Chain CNI-5618f94c5ce1b0733977592c (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.5.0/24          /* name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */
Chain CNI-DN-25cc9d1fb9cca5dfa023b (1 references)
target     prot opt source               destination         
CNI-HOSTPORT-SETMARK  tcp  --  10.4.6.0/24          0.0.0.0/0            tcp dpt:5555
CNI-HOSTPORT-SETMARK  tcp  --  127.0.0.1            0.0.0.0/0            tcp dpt:5555
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:5555 to:10.4.6.36:3000
Chain CNI-DN-5618f94c5ce1b07339775 (1 references)
target     prot opt source               destination         
CNI-HOSTPORT-SETMARK  tcp  --  10.4.5.0/24          0.0.0.0/0            tcp dpt:7070
CNI-HOSTPORT-SETMARK  tcp  --  127.0.0.1            0.0.0.0/0            tcp dpt:7070
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:7070 to:10.4.5.13:9090
Chain CNI-DN-cde09b3b5a187c320e2b7 (1 references)
target     prot opt source               destination         
CNI-HOSTPORT-SETMARK  tcp  --  10.4.0.0/24          0.0.0.0/0            tcp dpt:8787
CNI-HOSTPORT-SETMARK  tcp  --  127.0.0.1            0.0.0.0/0            tcp dpt:8787
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:8787 to:10.4.0.248:8787
Chain CNI-DN-e051b4354002202cf9ffd (1 references)
target     prot opt source               destination         
CNI-HOSTPORT-SETMARK  tcp  --  10.4.0.0/24          0.0.0.0/0            tcp dpt:9090
CNI-HOSTPORT-SETMARK  tcp  --  127.0.0.1            0.0.0.0/0            tcp dpt:9090
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:9090 to:10.4.0.177:8080
Chain CNI-DN-e75ab7614e7b86cfb175e (2 references)
target     prot opt source               destination         
CNI-HOSTPORT-SETMARK  tcp  --  10.4.0.0/24          0.0.0.0/0            tcp dpt:9080
CNI-HOSTPORT-SETMARK  tcp  --  127.0.0.1            0.0.0.0/0            tcp dpt:9080
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:9080 to:10.4.0.220:8080
CNI-HOSTPORT-SETMARK  tcp  --  10.4.0.0/24          0.0.0.0/0            tcp dpt:7881
CNI-HOSTPORT-SETMARK  tcp  --  127.0.0.1            0.0.0.0/0            tcp dpt:7881
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:7881 to:10.4.0.220:6881
CNI-HOSTPORT-SETMARK  udp  --  10.4.0.0/24          0.0.0.0/0            udp dpt:7881
CNI-HOSTPORT-SETMARK  udp  --  127.0.0.1            0.0.0.0/0            udp dpt:7881
DNAT       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:7881 to:10.4.0.220:6881
Chain CNI-HOSTPORT-DNAT (2 references)
target     prot opt source               destination         
CNI-DN-25cc9d1fb9cca5dfa023b  tcp  --  0.0.0.0/0            0.0.0.0/0            /* dnat name: "grafana_default" id: "default-dc44cf60a6bc51fff024700569eac611f9e2d4345bc6c02719ca359447a2b83d" */ multiport dports 5555
CNI-DN-e051b4354002202cf9ffd  tcp  --  0.0.0.0/0            0.0.0.0/0            /* dnat name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */ multiport dports 9090
CNI-DN-5618f94c5ce1b07339775  tcp  --  0.0.0.0/0            0.0.0.0/0            /* dnat name: "prometheus_default" id: "default-86d9632cceb1864e1c1ccb01ec98514a370ef33a0ef0dbd019b65fc7f1061b48" */ multiport dports 7070
CNI-DN-e75ab7614e7b86cfb175e  tcp  --  0.0.0.0/0            0.0.0.0/0            /* dnat name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */ multiport dports 9080,7881
CNI-DN-e75ab7614e7b86cfb175e  udp  --  0.0.0.0/0            0.0.0.0/0            /* dnat name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */ multiport dports 7881
CNI-DN-cde09b3b5a187c320e2b7  tcp  --  0.0.0.0/0            0.0.0.0/0            /* dnat name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */ multiport dports 8787
Chain CNI-HOSTPORT-MASQ (1 references)
target     prot opt source               destination         
MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0            mark match 0x2000/0x2000
Chain CNI-HOSTPORT-SETMARK (14 references)
target     prot opt source               destination         
MARK       all  --  0.0.0.0/0            0.0.0.0/0            /* CNI portfwd masquerade mark */ MARK or 0x2000
Chain CNI-a1a3b970ea04ce30791623c1 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-75b42901743ecabc618466d8de2d5dae720aa2d2698a9f1e48506b5787b4ecbe" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-75b42901743ecabc618466d8de2d5dae720aa2d2698a9f1e48506b5787b4ecbe" */
Chain CNI-b3f19f60df276d40982d25d1 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-c05943d4f3088bce0bcb8f0af55ba050573ec23e9381348f322b9bed01bc3537" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-c05943d4f3088bce0bcb8f0af55ba050573ec23e9381348f322b9bed01bc3537" */
Chain CNI-cabbcdf2359934d8654c9443 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.4.0/24          /* name: "utorrent_default" id: "default-0e06555195caab62bafd28dba973433670005b871486619df08d902b44e29f7f" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "utorrent_default" id: "default-0e06555195caab62bafd28dba973433670005b871486619df08d902b44e29f7f" */
Chain CNI-cde09b3b5a187c320e2b7701 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-cb694477e17817d77ada0e66547582fc827e6d3b3bcf9ef2755aa004695e3662" */
Chain CNI-d2170d7c041eaf9aafda1faa (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-f8393a3f6d51ea62224015f459736b8de8bd827533a25799da7258a12032d238" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-f8393a3f6d51ea62224015f459736b8de8bd827533a25799da7258a12032d238" */
Chain CNI-e051b4354002202cf9ffdb52 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-1090fb50ef07af464aca7fe0c99ffc7ebb00666924f5563b6c4d225ff30e183d" */
Chain CNI-e4eacdf53789f7f4a4a8008a (27 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-b3b924ccb081cc892f2cf0a45d1c7de0752e59d9ebf70a6386d543c1fdcf9cad" */
Chain CNI-e75ab7614e7b86cfb175ebc9 (1 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.0.0/24          /* name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "bridge" id: "default-145757de9518f035b8f9adbec57ac0daa85610750d4bb3558dbac1355b6147e7" */
Chain CNI-f6dc221730d77da4fcbf8bee (3 references)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            10.4.2.0/24          /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
MASQUERADE  all  --  0.0.0.0/0           !224.0.0.0/4          /* name: "qbit_default" id: "default-b2a772d9d1b161b98775f1156d188912dd7e6b25b07b25e427e049070d8de227" */
Chain DOCKER (2 references)
target     prot opt source               destination         
RETURN     all  --  0.0.0.0/0            0.0.0.0/0           
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            | 
Beta Was this translation helpful? Give feedback.
-
| Seems you have Docker on your machine. I think there would be rule conflict here  | 
Beta Was this translation helpful? Give feedback.
-
| We find the same problem when nerdctl installed in a host with docker | 
Beta Was this translation helpful? Give feedback.
-
| I think the root cause has been figured out. I will close the issue first. Feel free to reopen it if you have any problems | 
Beta Was this translation helpful? Give feedback.
-
| The reason is that docker will modify the default strategy of FORWARD:  https://docs.docker.com/network/packet-filtering-firewalls/#docker-on-a-router | 
Beta Was this translation helpful? Give feedback.
Seems you have Docker on your machine. I think there would be rule conflict here