Ports for TS3-server, Linux

Hello,
this is my first post. idk what to say, so i come to the point:
I have set up a server that also runs very well in the local network. However, I wanted to share it with the outside world. On every website there are other ports that have to be released. I have now released the ports (see picture):

Picture

However, it is still not possible to connect to the server from either Ipv4 or Ipv6. (Important: It is found in the server list). What can I do?

Im hosting not at home, but by my self.

I use Ubuntu.

How can i change firewall-settings in Linux (Ubuntu).

No, i don´t know how to work with iptables or ufw, i only worked with an raspberrypi => Tvheadend and OMV

Thanks for helping

@

I have changed it. Is ufw configured right?
`Zu Aktion Von


5900/tcp ALLOW IN Anywhere
9987 ALLOW IN Anywhere
30033 ALLOW IN Anywhere
9987/udp ALLOW IN Anywhere
30033/tcp ALLOW IN Anywhere
5900/tcp (v6) ALLOW IN Anywhere (v6)
9987 (v6) ALLOW IN Anywhere (v6)
30033 (v6) ALLOW IN Anywhere (v6)
9987/udp (v6) ALLOW IN Anywhere (v6)
30033/tcp (v6) ALLOW IN Anywhere (v6)`

sudo ufw status verbose:
(Translated:

Status: active:
protocol: on (low)
default settings: deny, allow, disable
new profile: skip
9987                       ALLOW IN    Anywhere
30033                      ALLOW IN    Anywhere
9987/udp                   ALLOW IN    Anywhere
30033/tcp                  ALLOW IN    Anywhere
22/tcp                     ALLOW IN    Anywhere
5900/tcp (v6)              ALLOW IN    Anywhere (v6)
9987 (v6)                  ALLOW IN    Anywhere (v6)
30033 (v6)                 ALLOW IN    Anywhere (v6)
9987/udp (v6)              ALLOW IN    Anywhere (v6)
30033/tcp (v6)             ALLOW IN    Anywhere (v6)
22/tcp (v6)                ALLOW IN    Anywhere (v6)

sudo iptables -L -n:

Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ufw-before-logging-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-before-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-logging-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-reject-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-track-input  all  --  0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination
ufw-before-logging-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-before-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-logging-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-reject-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-track-forward  all  --  0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ufw-before-logging-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-before-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-logging-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-reject-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-track-output  all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-after-forward (1 references)
target     prot opt source               destination

Chain ufw-after-input (1 references)
target     prot opt source               destination
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp                                                                                                                                                              dpt:137
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp                                                                                                                                                              dpt:138
ufw-skip-to-policy-input  tcp  --  0.0.0.0/0            0.0.0.0/0            tcp                                                                                                                                                              dpt:139
ufw-skip-to-policy-input  tcp  --  0.0.0.0/0            0.0.0.0/0            tcp                                                                                                                                                              dpt:445
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp                                                                                                                                                              dpt:67
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp                                                                                                                                                              dpt:68
ufw-skip-to-policy-input  all  --  0.0.0.0/0            0.0.0.0/0            ADD                                                                                                                                                             RTYPE match dst-type BROADCAST

Chain ufw-after-logging-forward (1 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min b                                                                                                                                                             urst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-after-logging-input (1 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min b                                                                                                                                                             urst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-after-logging-output (1 references)
target     prot opt source               destination

Chain ufw-after-output (1 references)
target     prot opt source               destination

Chain ufw-before-forward (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ES                                                                                                                                                             TABLISHED
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8
ufw-user-forward  all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-before-input (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ES                                                                                                                                                             TABLISHED
ufw-logging-deny  all  --  0.0.0.0/0            0.0.0.0/0            ctstate INV                                                                                                                                                             ALID
DROP       all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp spt:67 dpt:68
ufw-not-local  all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     udp  --  0.0.0.0/0            224.0.0.251          udp dpt:5353
ACCEPT     udp  --  0.0.0.0/0            239.255.255.250      udp dpt:1900
ufw-user-input  all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-before-logging-forward (1 references)
target     prot opt source               destination

Chain ufw-before-logging-input (1 references)
target     prot opt source               destination

Chain ufw-before-logging-output (1 references)
target     prot opt source               destination

Chain ufw-before-output (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ES                                                                                                                                                             TABLISHED
ufw-user-output  all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-logging-allow (0 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min b                                                                                                                                                             urst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "

Chain ufw-logging-deny (2 references)
target     prot opt source               destination
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID li                                                                                                                                                             mit: avg 3/min burst 10
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min b                                                                                                                                                             urst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-not-local (1 references)
target     prot opt source               destination
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst                                                                                                                                                             -type LOCAL
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst                                                                                                                                                             -type MULTICAST
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst                                                                                                                                                             -type BROADCAST
ufw-logging-deny  all  --  0.0.0.0/0            0.0.0.0/0            limit: avg                                                                                                                                                              3/min burst 10
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-reject-forward (1 references)
target     prot opt source               destination

Chain ufw-reject-input (1 references)
target     prot opt source               destination

If you need more Infos please ask.
Thank you very much!
@F

I have a Proplem…

vito@vitoT400:~$ sudo ufw allow 9987:9987/udp
[sudo] Passwort für vito:
ERROR: Ungültiger Port
vito@vitoT400:~$ sudo ufw allow 9987:9987/udp
ERROR: Ungültiger Port
vito@vitoT400:~$ sudo ufw allow 30033:30033/tcp
ERROR: Ungültiger Port
vito@vitoT400:~$

Ungültiger Port means invalid Port

Or did you mean i should only add these ? but i need 22 too.

A lot of cheap/ISP routers are unable to resolve your own IP address from devices within your LAN.

I use a Fritz!box 7590, i think it should be possible.

I’ll send you the link anyway, if you want you can look, but you don’t have to :slight_smile: