<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: iptable question in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784855#M44321</link>
    <description>I checked the following&lt;BR /&gt;&lt;BR /&gt;/etc/init.d/iptables status&lt;BR /&gt;Firewall is stopped.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Joe.</description>
    <pubDate>Fri, 06 May 2011 13:07:08 GMT</pubDate>
    <dc:creator>joe_91</dc:creator>
    <dc:date>2011-05-06T13:07:08Z</dc:date>
    <item>
      <title>iptable question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784854#M44320</link>
      <description>We have on a RHEL4/RHEL5 servers ip_conntrack module loaded and causing some network resources issues. My question is how could ip_conntrack module be loaded when we have disabled iptables? Could it be automatically loaded by any application? if so how could you look?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Joe.&lt;BR /&gt;</description>
      <pubDate>Fri, 06 May 2011 00:24:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784854#M44320</guid>
      <dc:creator>joe_91</dc:creator>
      <dc:date>2011-05-06T00:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: iptable question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784855#M44321</link>
      <description>I checked the following&lt;BR /&gt;&lt;BR /&gt;/etc/init.d/iptables status&lt;BR /&gt;Firewall is stopped.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Joe.</description>
      <pubDate>Fri, 06 May 2011 13:07:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784855#M44321</guid>
      <dc:creator>joe_91</dc:creator>
      <dc:date>2011-05-06T13:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: iptable question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784856#M44322</link>
      <description>RHEL's /etc/init.d/iptables is just one way to configure iptables firewalls - there might be a custom script or even a complete firewall management application that has applied a set of firewall settings completely separately from /etc/init.d/iptables.&lt;BR /&gt;&lt;BR /&gt;The conntrack module may have been loaded automatically when required by some iptables rule that has been removed since then: it won't auto-unload when it's no longer needed.&lt;BR /&gt;&lt;BR /&gt;What is the output of following commands:&lt;BR /&gt;&lt;BR /&gt;lsmod | grep conntrack&lt;BR /&gt;iptables -L -vn&lt;BR /&gt;iptables -L -vnt nat&lt;BR /&gt;iptables -L -vnt mangle&lt;BR /&gt;&lt;BR /&gt;If the "Used by" value of the conntrack module is 0 in the lsmod listing, the module is currently unused and can safely be rmmod'd.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Fri, 06 May 2011 17:16:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784856#M44322</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2011-05-06T17:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: iptable question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784857#M44323</link>
      <description>Here are the ouputs..&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;/etc/init.d/iptables status&lt;BR /&gt;Firewall is stopped.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;lsmod|grep conn&lt;BR /&gt;ip_conntrack 54297 1 iptable_nat&lt;BR /&gt;&lt;BR /&gt;(so there is one connection)&lt;BR /&gt;&lt;BR /&gt;When i did /etc/init.d/iptables stop and then did a lsmod|grep ip_conn the conntrack was gone. Does it mean there was some old connection sitting there? Also when i did cat /proc/net/ip_conntrack there was time_wait in those connections, so is it safe to assume that may some old connections or leftovers from from some rules?? Since there was one connection from lsmod output how do we find out what that is??&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Joe.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 May 2011 20:11:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784857#M44323</guid>
      <dc:creator>joe_91</dc:creator>
      <dc:date>2011-05-06T20:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: iptable question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784858#M44324</link>
      <description>Here are the other outputs&lt;BR /&gt;&lt;BR /&gt;#iptables -L -vn&lt;BR /&gt;Chain INPUT (policy ACCEPT 508 packets, 44674 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy ACCEPT 432 packets, 38412 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination&lt;BR /&gt;# iptables -L -vnt nat&lt;BR /&gt;Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;# iptables -L -vnt mangle&lt;BR /&gt;Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain INPUT (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;&lt;BR /&gt;Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination &lt;BR /&gt;        &lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Joe</description>
      <pubDate>Fri, 06 May 2011 20:18:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784858#M44324</guid>
      <dc:creator>joe_91</dc:creator>
      <dc:date>2011-05-06T20:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: iptable question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784859#M44325</link>
      <description>&amp;gt; lsmod|grep conn&lt;BR /&gt;&amp;gt; ip_conntrack 54297 1 iptable_nat&lt;BR /&gt;&lt;BR /&gt;&amp;gt; (so there is one connection)&lt;BR /&gt;&lt;BR /&gt;Not necessarily one connection, but one other module (specifically iptable_nat) using the services of the ip_conntrack module. &lt;BR /&gt;&lt;BR /&gt;/proc/net/ip_conntrack is *exactly* the right place to look: it lists the connections currently handled by the ip_conntrack module. &lt;BR /&gt;&lt;BR /&gt;Perhaps there was one or more existing NATted connections, or old NATted connections waiting for their TIME_WAIT timers to expire when you originally disabled iptables, so the module could not be removed at that time.&lt;BR /&gt;&lt;BR /&gt;Later, when you ran "/etc/init.d/iptables stop" again, those connections apparently had all reached a closed state, and both the iptable_nat and ip_conntrack modules could allow themselves to be removed without any risk of network traffic disruption.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Sat, 07 May 2011 06:45:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptable-question/m-p/4784859#M44325</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2011-05-07T06:45:00Z</dc:date>
    </item>
  </channel>
</rss>

