<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
</head>
<body bgcolor="#ffffff" text="#000000">
Below is my firewall rules for iptables.<br>
everything is working fine except for NFS <br>
I cannot mount my drive.<br>
<br>
If I turn off iptables I can mount.<br>
<br>
Looking at this :
<a class="moz-txt-link-freetext" href="http://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-nfs.html">http://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-nfs.html</a><br>
<div class="important">
<h2>Important</h2>
<p> In
order for NFS to work with a default installation of Red Hat Enterprise
Linux with a firewall enabled, IPTables with the default TCP port 2049
must be configured. Without proper IPTables configuration, NFS does not
function properly. </p>
<p> The NFS initialization script and <tt class="command">rpc.nfsd</tt>
process now allow binding to any specified port during system start up.
However, this can be error prone if the port is unavailable or
conflicts with another daemon. </p>
</div>
<br>
I have port 2049 listed in my iptables.<br>
<br>
Is there a reason I cannot mount?<br>
thanks,<br>
<br>
Jerry<br>
<br>
------------------------------<br>
<br>
<br>
# Firewall configuration written by system-config-securitylevel<br>
# Manual customization of this file is not recommended.<br>
*filter<br>
:INPUT ACCEPT [0:0]<br>
:FORWARD ACCEPT [0:0]<br>
:OUTPUT ACCEPT [0:0]<br>
:RH-Firewall-1-INPUT - [0:0]<br>
-A INPUT -j RH-Firewall-1-INPUT<br>
-A FORWARD -j RH-Firewall-1-INPUT<br>
-A RH-Firewall-1-INPUT -i lo -j ACCEPT<br>
-A RH-Firewall-1-INPUT -i lo -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2049
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 2049
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 69 -j
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 69 -j
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6540
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6500
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6510
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6520
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5060
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5036
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 4569
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 1720
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 4520
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 53 -j
ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5900
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5900
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2000
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 2000
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 5353
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5353
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6544
-j ACCEPT<br>
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited<br>
<br>
</body>
</html>