This is because you have the following rules declared:<br><br>
-A RH-Firewall-1-INPUT -i eth0 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -i eth1 -j ACCEPT<br><br>You should not use these rules because iptables will mark this traffic as valid and will not even try to match any rule defined later in the table. If you want to accept all traffic from you LAN (assuming eth1 is the private interface), you can still use this rule<br>
<br>
-A RH-Firewall-1-INPUT -i eth1 -j ACCEPT<br><br>Also, you only need one of these:<br><br>
-A RH-Firewall-1-INPUT -i lo -j ACCEPT<br><br><br><br><br><br><div class="gmail_quote">On Mon, Aug 3, 2009 at 1:06 PM, Jerry Geis <span dir="ltr"><<a href="mailto:geisj@pagestation.com">geisj@pagestation.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">My firewall config is below...<br>
<br>
I am trying to figure out why another machine has access to port 5038 on<br>
my machine<br>
based on these firewall rules.<br>
<br>
I thought the reject at the bottom would take care of all other ports?<br>
It does not.<br>
<br>
I have restarted with "server iptables restart" and same thing. I can<br>
connect from another machine<br>
to my machine on port 5038. How do I prevent this?<br>
<br>
Jerry<br>
<br>
---------------------------------<br>
<br>
<br>
This is my firewall:<br>
<br>
# Firewall configuration written by system-config-securitylevel<br>
# Manual customization of this file is not recommended.<br>
*filter<br>
:INPUT ACCEPT [0:0]<br>
:FORWARD ACCEPT [0:0]<br>
:OUTPUT ACCEPT [0:0]<br>
:RH-Firewall-1-INPUT - [0:0]<br>
-A INPUT -j RH-Firewall-1-INPUT<br>
-A FORWARD -j RH-Firewall-1-INPUT<br>
-A RH-Firewall-1-INPUT -i lo -j ACCEPT<br>
-A RH-Firewall-1-INPUT -i lo -j ACCEPT<br>
-A RH-Firewall-1-INPUT -i eth0 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -i eth1 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2049<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 2049<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 69 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 69 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6540<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6500<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6510<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6520<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5060<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5036<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 4569<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 1720<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 4520<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 53 -j<br>
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5900<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5900<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2000<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 2000<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5353<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5353<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6544<br>
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited<br>
COMMIT<br>
<br>
<br>
_______________________________________________<br>
CentOS mailing list<br>
<a href="mailto:CentOS@centos.org">CentOS@centos.org</a><br>
<a href="http://lists.centos.org/mailman/listinfo/centos" target="_blank">http://lists.centos.org/mailman/listinfo/centos</a><br>
</blockquote></div><br>