I've been trying for a few days now to configure a development JBoss working space on my Linux Ubuntu server (both AS7 and WildFly 8), but I can't seem to be able to configure it so that I can see the web-facing ports outside of the local network. I've looked through several tutorials and pages here on stackoverflow, and they all seem to point to these lines in standalone.xml:
452 <interfaces>
453 <interface name="management">
454 <inet-address value="${jboss.bind.address.management:127.0.0.1}"/>
455 </interface>
456 <interface name="public">
457 <inet-address value="${jboss.bind.address:127.0.0.1}"/>
458 </interface>
459 <!-- TODO - only show this if the jacorb subsystem is added -->
460 <interface name="unsecure">
461 <!--
462 ~ Used for IIOP sockets in the standard configuration.
463 ~ To secure JacORB you need to setup SSL
464 -->
465 <inet-address value="${jboss.bind.address.unsecure:127.0.0.1}"/>
466 </interface>
467 </interfaces>
I've tried several different solutions, changing the inet-address value to point to 0.0.0.0 like so
458 <inet-address value="${jboss.bind.address:0.0.0.0}"/>
as well as using the <any-address/>
and <any-ipv4-address/>
tag. I've also tried running the server with the -b 0.0.0.0 option. It appears that the changes take with all of these solutions, but when I try to visit the server by typing the IP address with port 9990, I still can't reach the admin console. I believe that the correct changes are being made with respect to interface-binding because on start-up it says
14:24:36,801 INFO [org.jboss.as] (Controller Boot Thread) JBAS015951: Admin console listening on http://0.0.0.0:9990
I also know that the server is physically reachable because when I simply type in the IP, I can see the /var/www directory structure.
When I use netstat | grep 9990, I get:
tcp 0 0 *:9990 *:* LISTEN 9519/java
Can anyone give me any suggestions as to why I am not able to reach the admin console? I've tried the solutions listed here: Can't access JBoss AS 7 from remote machine and here: How to share jboss over network
UPDATE: The result of the command iptables -L -v -n
is:
Chain INPUT (policy ACCEPT 1736K packets, 1702M bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 1402K packets, 149M bytes)
pkts bytes target prot opt in out source destination