Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 26 of 26 for ICMP (0.05 sec)

  1. cluster/gce/gci/configure-helper.sh

      # We need to add rules to accept all TCP/UDP/ICMP/SCTP packets.
      if iptables -w -L INPUT | grep "Chain INPUT (policy DROP)" > /dev/null; then
        echo "Add rules to accept all inbound TCP/UDP/ICMP packets"
        iptables -w -A INPUT -w -p TCP -j ACCEPT
        iptables -w -A INPUT -w -p UDP -j ACCEPT
        iptables -w -A INPUT -w -p ICMP -j ACCEPT
        iptables -w -A INPUT -w -p SCTP -j ACCEPT
      fi
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 10 22:07:47 UTC 2024
    - 141.1K bytes
    - Viewed (0)
  2. src/net/dial.go

    // It depends on each operating system how the operating system
    // behaves with a non-well known protocol number such as "0" or "255".
    //
    // Examples:
    //
    //	Dial("ip4:1", "192.0.2.1")
    //	Dial("ip6:ipv6-icmp", "2001:db8::1")
    //	Dial("ip6:58", "fe80::1%lo0")
    //
    // For TCP, UDP and IP networks, if the host is empty or a literal
    // unspecified IP address, as in ":80", "0.0.0.0:80" or "[::]:80" for
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Feb 20 06:04:31 UTC 2024
    - 26.9K bytes
    - Viewed (0)
  3. cluster/gce/util.sh

        if ! gcloud compute firewall-rules create "$1" \
          --project "${NETWORK_PROJECT}" \
          --network "${NETWORK}" \
          --source-ranges "$2" \
          --target-tags "$3" \
          --allow tcp,udp,icmp,esp,ah,sctp; then
          if (( attempt > 4 )); then
            echo -e "${color_red}Failed to create firewall rule $1 ${color_norm}" >&2
            exit 2
          fi
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 12 21:47:17 UTC 2024
    - 161.6K bytes
    - Viewed (0)
  4. pkg/apis/networking/validation/validation_test.go

    		r.EndPort = utilpointer.Int32(endPort)
    	}
    	return r
    }
    
    func TestValidateNetworkPolicy(t *testing.T) {
    	protocolTCP := api.ProtocolTCP
    	protocolUDP := api.ProtocolUDP
    	protocolICMP := api.Protocol("ICMP")
    	protocolSCTP := api.ProtocolSCTP
    
    	// Tweaks used below.
    	setIngressEmptyFirstElement := func(networkPolicy *networking.NetworkPolicy) {
    		networkPolicy.Spec.Ingress = []networking.NetworkPolicyIngressRule{{}}
    	}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 31 21:05:06 UTC 2023
    - 73.3K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.13.md

    ### Other notable changes
    
    * Connections from Pods to Services with 0 endpoints will now ICMP reject immediately, rather than blackhole and timeout. ([#72534](https://github.com/kubernetes/kubernetes/pull/72534), [@thockin](https://github.com/thockin))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 273.1K bytes
    - Viewed (0)
  6. pkg/apis/core/validation/validation_test.go

    			field.ErrorTypeNotSupported,
    			"protocol", `supported values: "SCTP", "TCP", "UDP"`,
    		},
    		"invalid protocol": {
    			[]core.ContainerPort{{ContainerPort: 80, Protocol: "ICMP"}},
    			field.ErrorTypeNotSupported,
    			"protocol", `supported values: "SCTP", "TCP", "UDP"`,
    		},
    		"protocol required": {
    			[]core.ContainerPort{{Name: "abc", ContainerPort: 80}},
    			field.ErrorTypeRequired,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 857.7K bytes
    - Viewed (0)
Back to top