Всем привет, собственно сабж.
Имеется VPS в Европе, сервер на RHEL7, на нем запущен тунель до этого VPS:
$ ssh -f -C2qTnN -D \*:2003 12.34.56.78
$ ssh -f -C2qTnN -D 192.168.1.2:2003 12.34.56.78
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere
ACCEPT icmp -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere ctstate NEW tcp dpt:ssh
ACCEPT tcp -- anywhere anywhere ctstate NEW tcp dpt:cfinger <-- это и есть 2003 порт
ACCEPT udp -- anywhere anywhere ctstate NEW udp dpt:brutus <--/
ACCEPT udp -- anywhere anywhere ctstate NEW udp dpt:netbios-ns
ACCEPT udp -- anywhere anywhere ctstate NEW udp dpt:netbios-dgm
ACCEPT tcp -- anywhere anywhere ctstate NEW tcp dpt:netbios-ssn
ACCEPT tcp -- anywhere anywhere ctstate NEW tcp dpt:microsoft-ds
REJECT all -- anywhere anywhere reject-with icmp-host-prohibited
Chain FORWARD (policy DROP)
target prot opt source destination
REJECT all -- anywhere anywhere reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain DOCKER (0 references)
target prot opt source destination
Chain DOCKER-ISOLATION (0 references)
target prot opt source destination
Chain DOCKER-USER (0 references)
target prot opt source destination
$ nmap -sV 192.168.1.2 -p 2003
Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-03 00:21 MSK
Nmap scan report for 192.168.1.2
Host is up (0.0020s latency).
PORT STATE SERVICE VERSION
2003/tcp closed finger
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 0.64 seconds
Настроен firefox и не может(