If you can try turning off your firewall (even if it looks good for me), while testing,
/etc/init.d/iptables stop

regards,

Guillermo.


On 7/12/06, Robert List <list06@abbacomm.net> wrote:
Did you check your logs to see what the error(s)s was/were? It will pretty
much tell you exactly what happened there.

Then of course I do this when I deal with inetd or more specifically in this
case xinetd... YMMV

netstat -a | more

then I would tailor some /etc/hosts.allow and /etc/hosts.deny files

#
# hosts.deny    This file describes the names of the hosts which are
#               *not* allowed to use the local INET services, as decided
#               by the '/usr/sbin/tcpd' server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow.  In particular
# you should know that NFS uses portmap!
ALL:ALL

And then

#
# hosts.allow   This file describes the names of the hosts which are
#               allowed to use the local INET services, as decided
#               by the '/usr/sbin/tcpd' server.
#
# in.tftpd in.telnetd sshd
#
in.tftpd:               someipaddressornetworkhere

what it sounds like is a SOURCE and/or destination ip address issue with the
firewall or hosts.allow and hosts.deny files.

- rh

--
Robert Hanson - Abba Communications
   Computer & Internet Services
(509) 624-7159 - www.abbacomm.net


_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos