{"id":751,"date":"2023-12-13T21:52:37","date_gmt":"2023-12-13T13:52:37","guid":{"rendered":"https:\/\/www.nanoexpress.com\/?p=751"},"modified":"2024-01-26T14:51:26","modified_gmt":"2024-01-26T06:51:26","slug":"socket%e6%97%a0%e6%b3%95%e6%94%b6%e5%88%b0%e7%bb%84%e6%92%ad%e6%95%b0%e6%8d%ae%e7%9a%84%e8%a7%a3%e5%86%b3%e6%96%b9%e6%a1%88","status":"publish","type":"post","link":"https:\/\/www.nanoexpress.com\/?p=751","title":{"rendered":"socket\u65e0\u6cd5\u6536\u5230\u7ec4\u64ad\u6570\u636e\u7684\u89e3\u51b3\u65b9\u6848"},"content":{"rendered":"\n<p>1) \u4f7f\u7528tcpdump -i eth0 -nnn udp  \u67e5\u770b\u7f51\u5361\u7ec4\u64ad\u6570\u636e\u5730\u5740\uff0c\u4f8b\u5982\u7ec4\u64ad\u5730\u5740:\u7aef\u53e3\u4e3a 239.6.7.11:4567<br>2) route -n \u67e5\u770b\u662f\u5426\u8def\u7531\u5141\u8bb81)\u6b65\u9aa4\u4e2d\u7684\u6570\u636e\u8fdb\u5165\u7f51\u53e3\uff0c\u5982\u679c\u6ca1\u6709\uff0c\u53ef\u901a\u8fc7\u4ee5\u4e0b\u547d\u4ee4\u914d\u7f6e<br><code>route add 239.6.7.11\/32 dev eth0 # \u4ee5239.6.7.11\u7ec4\u64ad\u6570\u636e\u8fdb\u5165eth0\u7f51\u53e3\u4e3a\u4f8b<\/code><br>\u6216\u8005<br><code>route add -net 239.6.7.11 netmask 255.255.255.255 dev eth0<\/code><br>\u82e5\u6ca1\u6709route\u547d\u4ee4\uff0c\u53ef\u4f7f\u7528ip\u547d\u4ee4<br><code>ip route add 239.6.7.11\/32 dev eth0<\/code><br>\u8be5\u914d\u7f6e\u91cd\u542f\u540e\u4f1a\u6d88\u5931\uff0c\u82e5\u8981\u6c38\u4e45\u6dfb\u52a0\uff0c\u53ef\u901a\u8fc7\u4fee\u6539\/etc\/sysconfig\/network-scripts\u4e2d\u5bf9\u5e94\u7f51\u53e3\u7684\u8def\u7531\u6587\u4ef6\u8fdb\u884c\u914d\u7f6e(\u4ec5\u9650centos\/redhat)<\/p>\n\n\n\n<p>3\uff09\u5173\u95ed\u9632\u706b\u5899\u6216\u8005\u589e\u52a0\u9632\u706b\u5899\u89c4\u5219<\/p>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>CentOS:  \n            <span style=\"background-color: initial; font-family: inherit; font-size: inherit; color: initial;\">firewall-cmd --state #\u67e5\u770b\u9632\u706b\u5899\u5f53\u524d\u72b6\u6001<\/span><code>            systemctl stop firewalld \u505c\u6b62\u9632\u706b\u5899\n            systemctl disable firewalld \u7981\u6b62\u5f00\u673a\u542f\u52a8<\/code>\n            # \u82e5\u4e0d\u60f3\u5173\u95ed\u9632\u706b\u5899\uff0c\u53ef\u8bbe\u7f6e\u89c4\u5219\u5141\u8bb8\u6765\u81eaeth0(\u4f8b\u5b50)\u7684udp\u4e14\u7aef\u53e3\u4e3a4567\u7684\u6570\u636e\u901a\u8fc7\n            firewall-cmd --permanent --direct -add-rule ipv4 filter INPUT 0 -i eth0 -p udp --dport 4567 -j ACCEPT\n            firewall-cmd --reload \u6dfb\u52a0\u89c4\u5219\u540e\u91cd\u542f\u9632\u706b\u5899\n\nUbuntu: ufw status \u67e5\u770b\u9632\u706b\u5899\u5f53\u524d\u72b6\u6001\n            ufw disalbe \u505c\u6b62\u9632\u706b\u5899\n            ufw enable \u542f\u52a8\u9632\u706b\u5899\n            \u82e5\u4e0d\u60f3\u5173\u95ed\u9632\u706b\u5899\uff0c\u53ef\u8bbe\u7f6e\u89c4\u5219\u5141\u8bb8\u6765\u81eaeth0(\u4f8b\u5b50)\u7684udp\u4e14\u7ec4\u64ad\u5730\u5740\u4e3a239.6.7.11\u7684\u6570\u636e\u901a\u8fc7\n            ufw allow in proto udp to 239.6.7.11\n<\/code><\/pre>\n\n\n\n<p>4) \u8bbe\u7f6e\u7f51\u53e3\u7684rp_filter     <\/p>\n\n\n\n<p>\u4fee\u6539\/etc\/sysctl.conf\u6587\u4ef6\uff0c\u4fee\u6539\u4ee5\u4e0b\u5185\u5bb9\uff08\u5047\u8bbe\u63a5\u6536\u6570\u636e\u7684\u7f51\u53e3\u4e3aeth0\uff09     <\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>net.ipv4.conf.all.rp_filter=0<\/p>\n\n\n\n<p>net.ipv4.conf.default.rp_filter=0     <\/p>\n\n\n\n<p>net.ipv4.conf.eth0.rp_filter=0     <\/p>\n<\/div>\n\n\n\n<p>\u4fdd\u5b58\u6587\u4ef6\u540e\u6267\u884c\u4ee5\u4e0b\u547d\u4ee4\u751f\u6548    <\/p>\n\n\n\n<p> sysctl -p <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>5) \u6253\u5f00\u7f51\u5361\u6df7\u6742\u6a21\u5f0f<\/p>\n\n\n\n<p> ifconfig eth0 promisc<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1) \u4f7f\u7528tcpdump -i eth0 -nnn udp \u67e5\u770b\u7f51\u5361\u7ec4\u64ad\u6570\u636e\u5730\u5740\uff0c\u4f8b\u5982\u7ec4\u64ad\u5730\u5740:\u7aef\u53e3\u4e3a 239 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-751","post","type-post","status-publish","format-standard","hentry","category-fpga"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=\/wp\/v2\/posts\/751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=751"}],"version-history":[{"count":9,"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=\/wp\/v2\/posts\/751\/revisions"}],"predecessor-version":[{"id":881,"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=\/wp\/v2\/posts\/751\/revisions\/881"}],"wp:attachment":[{"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nanoexpress.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}