I can't access my virtualmin via browser

9 posts / 0 new
Last post
#1 Tue, 06/23/2015 - 18:35
Bsara

I can't access my virtualmin via browser

I can't access my virtualmin when I go to browser and write https://myip:10000 I found this message in the pic attached with the post my server have 8 GB RAM and 80 GB from disk so how to solve this issue http://take.ms/bhais

Wed, 06/24/2015 - 03:53
Diabolico
Diabolico's picture

Did you open port 10000 on your firewall?

- I often come to the conclusion that my brain has too many tabs open. -
Failing at desktop publishing & graphic design since 1994.

Wed, 06/24/2015 - 09:49
Bsara

yes I've run "netstat -plunt" and I had this "tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN 8344/perl "

Wed, 06/24/2015 - 10:13
andreychek

Howdy,

It looks like Webmin is listening there, according to the netstat output.

If you log into your server, can you use a tool such as links to access Webmin? For example, you could try:

links https://127.0.0.1:10000

Also, what is the output of this command:

iptables -L -n

Wed, 06/24/2015 - 10:38
Bsara

<code< Chain INPUT (policy DROP) target prot opt source destination
ACCEPT tcp -- 209.244.0.3 0.0.0.0/0 tcp dpt:53 ACCEPT udp -- 209.244.0.3 0.0.0.0/0 udp dpt:53 ACCEPT tcp -- 209.244.0.3 0.0.0.0/0 tcp spt:53 ACCEPT udp -- 209.244.0.3 0.0.0.0/0 udp spt:53 ACCEPT tcp -- 8.8.8.8 0.0.0.0/0 tcp dpt:53 ACCEPT udp -- 8.8.8.8 0.0.0.0/0 udp dpt:53 ACCEPT tcp -- 8.8.8.8 0.0.0.0/0 tcp spt:53 ACCEPT udp -- 8.8.8.8 0.0.0.0/0 udp spt:53 ACCEPT tcp -- 8.8.4.4 0.0.0.0/0 tcp dpt:53 ACCEPT udp -- 8.8.4.4 0.0.0.0/0 udp dpt:53 ACCEPT tcp -- 8.8.4.4 0.0.0.0/0 tcp spt:53 ACCEPT udp -- 8.8.4.4 0.0.0.0/0 udp spt:53 LOCALINPUT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INVALID tcp -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:20 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:21 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:110 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:143 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:465 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:587 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:993 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:995 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:20 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:21 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8 limit: avg 1/sec burst 5 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 0 limit: avg 1/sec burst 5 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 11 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 3 LOGDROPIN all -- 0.0.0.0/0 0.0.0.0/0

Chain FORWARD (policy DROP) target prot opt source destination

Chain OUTPUT (policy DROP) target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 209.244.0.3 tcp dpt:53 ACCEPT udp -- 0.0.0.0/0 209.244.0.3 udp dpt:53 ACCEPT tcp -- 0.0.0.0/0 209.244.0.3 tcp spt:53 ACCEPT udp -- 0.0.0.0/0 209.244.0.3 udp spt:53 ACCEPT tcp -- 0.0.0.0/0 8.8.8.8 tcp dpt:53 ACCEPT udp -- 0.0.0.0/0 8.8.8.8 udp dpt:53 ACCEPT tcp -- 0.0.0.0/0 8.8.8.8 tcp spt:53 ACCEPT udp -- 0.0.0.0/0 8.8.8.8 udp spt:53 ACCEPT tcp -- 0.0.0.0/0 8.8.4.4 tcp dpt:53 ACCEPT udp -- 0.0.0.0/0 8.8.4.4 udp dpt:53 ACCEPT tcp -- 0.0.0.0/0 8.8.4.4 tcp spt:53 ACCEPT udp -- 0.0.0.0/0 8.8.4.4 udp spt:53 LOCALOUTPUT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INVALID tcp -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:20 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:21 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:110 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:113 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:587 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:993 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:995 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:20 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:21 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:113 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:123 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 0 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 11 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 3 LOGDROPOUT all -- 0.0.0.0/0 0.0.0.0/0

Chain ALLOWIN (1 references) target prot opt source destination
ACCEPT all -- 196.20.59.213 0.0.0.0/0

Chain ALLOWOUT (1 references) target prot opt source destination
ACCEPT all -- 0.0.0.0/0 196.20.59.213

Chain DENYIN (1 references) target prot opt source destination
DROP all -- 196.20.59.213 0.0.0.0/0

Chain DENYOUT (1 references) target prot opt source destination
LOGDROPOUT all -- 0.0.0.0/0 196.20.59.213

Chain INVALID (2 references) target prot opt source destination
INVDROP all -- 0.0.0.0/0 0.0.0.0/0 state INVALID INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x3F INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x05/0x05 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x11/0x01 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x18/0x08 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x30/0x20 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 state NEW

Chain INVDROP (10 references) target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0

Chain LOCALINPUT (1 references) target prot opt source destination
ALLOWIN all -- 0.0.0.0/0 0.0.0.0/0
DENYIN all -- 0.0.0.0/0 0.0.0.0/0

Chain LOCALOUTPUT (1 references) target prot opt source destination
ALLOWOUT all -- 0.0.0.0/0 0.0.0.0/0
DENYOUT all -- 0.0.0.0/0 0.0.0.0/0

Chain LOGDROPIN (1 references) target prot opt source destination
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:67 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:68 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:111 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:111 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:113 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:135:139 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:135:139 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:445 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:500 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:500 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:513 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:513 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:520 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:520 LOG tcp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix Firewall: *TCP_IN Blocked* ' LOG udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefixFirewall: UDP_IN Blocked ' LOG icmp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: ICMP_IN Blocked ' DROP all -- 0.0.0.0/0 0.0.0.0/0

Chain LOGDROPOUT (2 references) target prot opt source destination
LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix Firewall: *TCP_OUT Blocked* ' LOG udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefixFirewall: UDP_OUT Blocked ' LOG icmp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: ICMP_OUT Blocked ' DROP all -- 0.0.0.0/0 0.0.0.0/0

Wed, 06/24/2015 - 10:46
Bsara
Wed, 06/24/2015 - 11:04
andreychek

Howdy,

Ah, links won't connect to a self-signed SSL certificate... but that does show that it's able to connect to port 10000.

I think you're issue is related to the firewall running on your server.

I don't see anything in the firewall rules that is allowing connections on port 10000.

My suggestion would be to either disable the firewall completely, or to at least open up port 10000.

If you leave it running, just remember that it may be blocking other services you need access to as well, so if you run into problems, you may need to review your firewall setup and open up some additional ports.

-Eric

Wed, 06/24/2015 - 15:16
Bsara

I've done I stopped the firewall to check this problem and it opens in the browser after while if I try to navigate inside the panel or refresh it, it happens again and shows me error time-out connection

Wed, 06/24/2015 - 22:08
Bsara

Thanks for your support I've added the port 10000 to my iptable and its okay now :)

Topic locked