<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPTABLES in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052211#M48667</link>
    <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;This is tough to learn, espcially in a hurry. It literally took me years to learn the subtlties here. Take a look at my past questions.&lt;BR /&gt;&lt;BR /&gt;Firestarter has a GUI, you point you click you have a firewall. I really recommend it for beginners.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Tue, 12 Jun 2007 06:55:53 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2007-06-12T06:55:53Z</dc:date>
    <item>
      <title>IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052200#M48656</link>
      <description>Hi there&lt;BR /&gt;&lt;BR /&gt;It's a web server&lt;BR /&gt;&lt;BR /&gt;If I remove the rule nr 1 then the access to webpage is being blocked. And I dont know why, as the rule nr 4 says to allow tcp at port 80?&lt;BR /&gt;I just want to block any ssh trafic except my computers ip adress.&lt;BR /&gt;&lt;BR /&gt;Can enyone help ?&lt;BR /&gt;&lt;BR /&gt;Chain INPUT (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  192.168.0.1       192.168.0.2       tcp dpt:22 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:443 state NEW&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:53 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:53 state NEW&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:69 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:69 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:25 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:110 state NEW&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:123 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:20 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:21 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:3306 state NEW&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:3306 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:5555 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:8002 state NEW&lt;BR /&gt;DROP       all  --  0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Jun 2007 07:44:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052200#M48656</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-11T07:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052201#M48657</link>
      <description>Try running iptables -L&lt;BR /&gt;Rule 1 should apply to the loopback device (lo)&lt;BR /&gt;Without it you may have lots of problems with &lt;BR /&gt;network based services.&lt;BR /&gt;Rules 2 and 4 should apply to (eth0) and allow&lt;BR /&gt;the web server to run.&lt;BR /&gt;Rule 1 may break internal services used by the &lt;BR /&gt;web server.&lt;BR /&gt;&lt;BR /&gt;I use the shoreline firewall (shorewall) to &lt;BR /&gt;configure my firewall.  It also provides nice &lt;BR /&gt;status services to check the state of the &lt;BR /&gt;firewall.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Jun 2007 07:57:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052201#M48657</guid>
      <dc:creator>Bill Thorsteinson</dc:creator>
      <dc:date>2007-06-11T07:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052202#M48658</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Your results are expected.&lt;BR /&gt;&lt;BR /&gt;Chain INPUT (policy DROP)&lt;BR /&gt;target prot opt source destination&lt;BR /&gt;ACCEPT all -- 0.0.0.0/0 0.0.0.0/0&lt;BR /&gt;&lt;BR /&gt;Default policy is drop, which is overridden by the ACCEPT all policy.&lt;BR /&gt;&lt;BR /&gt;So I'm kind of wondering what the point here is.&lt;BR /&gt;&lt;BR /&gt;Anyway, lets take the current policy and make it work.&lt;BR /&gt;&lt;BR /&gt;Lets say the local lan is 192.168.0.0 network. Lets aslo say its a Class C. netmask 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;Lets say your external IP address is 66.102.55.104, also class C.&lt;BR /&gt;&lt;BR /&gt;iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT&lt;BR /&gt;iptables -A INPUT -s 66.102.55.104 -j DROP&lt;BR /&gt;&lt;BR /&gt;The rest of your rules,as inconsistent as they are will work.  iptables is read top down, once a rule match is found it stops checking.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 11 Jun 2007 08:27:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052202#M48658</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-06-11T08:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052203#M48659</link>
      <description>When I'll do:&lt;BR /&gt;&lt;BR /&gt; sudo /sbin/iptables -R INPUT 1 -i lo -j ACCEPT&lt;BR /&gt;&lt;BR /&gt;then I'm loosing the connection with the server.&lt;BR /&gt;&lt;BR /&gt;:(&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Jun 2007 08:55:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052203#M48659</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-11T08:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052204#M48660</link>
      <description>I will explain one more time what Im trying to do:&lt;BR /&gt;&lt;BR /&gt;1.ACCEPT all -- 0.0.0.0/0 0.0.0.0/0  - if I remove this rule the webpage gets bloked.&lt;BR /&gt;&lt;BR /&gt;2. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED - I want keep every established and related to it connection.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;3.ACCEPT tcp -- 81.xxx.xxx.xxx 217.xxx.xxx.xxx tcp dpt:22 state NEW -  Accept ssh connections from my office to the remote directory where the server is located.&lt;BR /&gt;&lt;BR /&gt;4.ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW -  to accept every connection from the internet to the web server using http.&lt;BR /&gt;&lt;BR /&gt;5.ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW - Accept https connections to this server.&lt;BR /&gt;&lt;BR /&gt;...&lt;BR /&gt;&lt;BR /&gt;And so on with other protocols.&lt;BR /&gt; &lt;BR /&gt;I've put this firs rule (to accept all) becase people couldn't open the webpage.&lt;BR /&gt;&lt;BR /&gt;I want to drop all conections of all types EXCEPT those listed.&lt;BR /&gt;&lt;BR /&gt;But as soon as I remove the Accept all rool at the firs possition  - my webpage gets bloked.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Jun 2007 09:50:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052204#M48660</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-11T09:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052205#M48661</link>
      <description>I suggest you to use a script to build the firewall rules, like rc.firewall or &lt;A href="http://www.fwbuilder.org/" target="_blank"&gt;http://www.fwbuilder.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You have to add rules for accept everything from localhost and its interfaces, or you will be blocking yourself and you will have a lot of problems with network services.</description>
      <pubDate>Mon, 11 Jun 2007 10:26:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052205#M48661</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2007-06-11T10:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052206#M48662</link>
      <description>See this page also:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://easyfwgen.morizot.net/gen/index.php" target="_blank"&gt;http://easyfwgen.morizot.net/gen/index.php&lt;/A&gt;</description>
      <pubDate>Mon, 11 Jun 2007 10:29:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052206#M48662</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2007-06-11T10:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052207#M48663</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;I think your approach is wrong.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.fs-security.com/" target="_blank"&gt;http://www.fs-security.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Site is down for me write now. Its available in many fedora yum repos.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 11 Jun 2007 12:34:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052207#M48663</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-06-11T12:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052208#M48664</link>
      <description>You should always go back to the original iptables rules when you're looking at a problem. The output you paste looks like it's from "iptables -L", which does not display the complete rules. You need to add a "-v" if you want to see the full rules.&lt;BR /&gt;&lt;BR /&gt;Personally, I prefer to go look at my iptables shell script or the output from iptables-save instead. I usually don't care about the counters and I find the original iptables commands just as easy to read, especially if they're in a file with comments.</description>
      <pubDate>Mon, 11 Jun 2007 12:46:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052208#M48664</guid>
      <dc:creator>Heironimus</dc:creator>
      <dc:date>2007-06-11T12:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052209#M48665</link>
      <description>Chain INPUT (policy DROP 61 packets, 5349 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination&lt;BR /&gt;      3   144 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:22 state NEW&lt;BR /&gt;&lt;BR /&gt;Ok&lt;BR /&gt;&lt;BR /&gt;So My question is why ssh is rejected in this situation? SSHD is up and running as soon as I'll do: &lt;BR /&gt;&lt;BR /&gt;iptables -I INPUT -j ACCEPT averythink works fine, but obviously id dont like this rule.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jun 2007 03:16:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052209#M48665</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-12T03:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052210#M48666</link>
      <description>What's your OUTPUT chain look like?</description>
      <pubDate>Tue, 12 Jun 2007 05:12:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052210#M48666</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2007-06-12T05:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052211#M48667</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;This is tough to learn, espcially in a hurry. It literally took me years to learn the subtlties here. Take a look at my past questions.&lt;BR /&gt;&lt;BR /&gt;Firestarter has a GUI, you point you click you have a firewall. I really recommend it for beginners.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 12 Jun 2007 06:55:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052211#M48667</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-06-12T06:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052212#M48668</link>
      <description>The server is in remote location.&lt;BR /&gt;I don't have graphic environment.&lt;BR /&gt;&lt;BR /&gt;I've partialy solved the problem.&lt;BR /&gt;&lt;BR /&gt;The thing is you have to spicify the interface -i eth0 (but the rea server has eth0 + eth0:0). Then on testng machine everythink works fine.But not at the real server. Problem with eth0:0?&lt;BR /&gt;&lt;BR /&gt;real server iptables - webpage blocked,ssh-ok,ping-ok&lt;BR /&gt;==========================================&lt;BR /&gt;Chain INPUT (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 state NEW&lt;BR /&gt;ACCEPT     tcp  --  81.xxx.xxx.xxx       217.xxx.xxx.xxx       tcp dpt:22 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  81.xxx.xxx.xxx       217.xxx.xxx.xxx       tcp dpt:22 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:443 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:443 state NEW&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:53 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:53 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:53 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:53 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:25 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:25 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:110 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:110 state NEW&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:123 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:123 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:3306 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:3306 state NEW&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:3306 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:3306 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:5555 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:5555 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:8002 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:8002 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:9001 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:9001 state NEW&lt;BR /&gt;ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state NEW&lt;BR /&gt;&lt;BR /&gt;==========================================&lt;BR /&gt;On the testing machine I have apache instaled and several rules in iptables:&lt;BR /&gt;&lt;BR /&gt;testing machine - everything works fine&lt;BR /&gt;==========================================&lt;BR /&gt;Chain INPUT (policy DROP)&lt;BR /&gt;target     prot opt source               destination&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 state NEW&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:22 state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:22 state NEW&lt;BR /&gt;ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED&lt;BR /&gt;ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state NEW&lt;BR /&gt;&lt;BR /&gt;Everythink works fine.&lt;BR /&gt;The only one difference betwen those machines is the virtual (eth0:0) interface on the web server.&lt;BR /&gt;&lt;BR /&gt;I can ping it,ssh is working but I can't open the webpage.&lt;BR /&gt;&lt;BR /&gt;I have to do that with iptables&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jun 2007 07:52:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052212#M48668</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-12T07:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052213#M48669</link>
      <description>Chain OUTPUT (policy ACCEPT 181 packets, 13459 bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination&lt;BR /&gt; 987K  522M ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;  96M  131G ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state NEW,RELATED,ESTABLISHED&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jun 2007 07:57:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052213#M48669</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-12T07:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052214#M48670</link>
      <description>Finaly it works:&lt;BR /&gt;&lt;BR /&gt;Chain INPUT (policy DROP 443 packets, 52393 bytes)&lt;BR /&gt;num   pkts bytes target     prot opt in     out     source               destination&lt;BR /&gt;1     5009 1448K ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;2     1685  365K ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:80&lt;BR /&gt;3        0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:80 state RELATED,ESTABLISHED&lt;BR /&gt;4        0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:80 state NEW&lt;BR /&gt;5     2083  161K ACCEPT     tcp  --  eth0   *       81.150.xxx.xxx       217.174.xxx.xxx       tcp dpt:22 state RELATED,ESTABLISHED&lt;BR /&gt;6        4   192 ACCEPT     tcp  --  eth0   *       81.150.xxx.xxx       217.174.xxx.xxx      tcp dpt:22 state NEW&lt;BR /&gt;7        0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:443 state RELATED,ESTABLISHED&lt;BR /&gt;8        0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:443 state NEW&lt;BR /&gt;9        0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           udp dpt:53 state RELATED,ESTABLISHED&lt;BR /&gt;10       1    71 ACCEPT     udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           udp dpt:53 state NEW&lt;BR /&gt;11       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:53 state RELATED,ESTABLISHED&lt;BR /&gt;12       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:53 state NEW&lt;BR /&gt;13       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:25 state RELATED,ESTABLISHED&lt;BR /&gt;14       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:25 state NEW&lt;BR /&gt;15       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:110 state RELATED,ESTABLISHED&lt;BR /&gt;16       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:110 state NEW&lt;BR /&gt;17      17  1292 ACCEPT     udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           udp dpt:123 state RELATED,ESTABLISHED&lt;BR /&gt;18       0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           udp dpt:123 state NEW&lt;BR /&gt;19    188K   12M ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:3306 state RELATED,ESTABLISHED&lt;BR /&gt;20     356 21360 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:3306 state NEW&lt;BR /&gt;21       0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           udp dpt:3306 state RELATED,ESTABLISHED&lt;BR /&gt;22       0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           udp dpt:3306 state NEW&lt;BR /&gt;23       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5555 state RELATED,ESTABLISHED&lt;BR /&gt;24       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5555 state NEW&lt;BR /&gt;25       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:8002 state RELATED,ESTABLISHED&lt;BR /&gt;26       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:8002 state NEW&lt;BR /&gt;27       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:9001 state RELATED,ESTABLISHED&lt;BR /&gt;28       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0           tcp dpt:9001 state NEW&lt;BR /&gt;29       0     0 ACCEPT     icmp --  eth0   *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED&lt;BR /&gt;30    4527  272K ACCEPT     icmp --  eth0   *       0.0.0.0/0            0.0.0.0/0           state NEW&lt;BR /&gt;31       0     0 ACCEPT     tcp  --  eth0   *       217.xxx.xxx.xxx        217.xxx.xxx.xxx       tcp dpt:22 state RELATED,ESTABLISHED&lt;BR /&gt;32       0     0 ACCEPT     tcp  --  eth0   *       217.xxx.xxx.xxx        217.xxx.xxx.xxx       tcp dpt:22 state NEW&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jun 2007 12:38:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052214#M48670</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-12T12:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPTABLES</title>
      <link>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052215#M48671</link>
      <description>closed</description>
      <pubDate>Tue, 12 Jun 2007 12:43:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/iptables/m-p/5052215#M48671</guid>
      <dc:creator>Piotr Kirklewski</dc:creator>
      <dc:date>2007-06-12T12:43:30Z</dc:date>
    </item>
  </channel>
</rss>

