[CentOS] IPTables not working?

Thu Aug 25 16:50:01 UTC 2005
Mike <centos at silverservers.com>

Hello Sean,

/etc/init.d/iptables restart
Flushing firewall rules: [  OK  ]
Setting chains to policy ACCEPT: filter [  OK  ]
Unloading iptables modules: [  OK  ]
Applying iptables firewall rules: [  OK  ]
Loading additional iptables modules: ip_conntrack_ftp [  OK  ]

*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 53 -j ACCEPT 
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 53 -j ACCEPT 
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 110 -j ACCEPT 
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT 
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -m tcp -p tcp --dport 20 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT

Of course, when I restart, the rule I entered with:
iptables -A RH-Firewall-1-INPUT -s 195.225.176.0/24 -j DROP

-- 
Best regards,
 Mike
            mailto:centos at silverservers.com

Thursday, August 25, 2005, 9:15:01 AM, you wrote:

> On Thu, 2005-08-25 at 07:48 -0700, centos at silverservers.com wrote:
>> Hello CentOS,
>> 
>> I'm having a strange situation on one of my servers.  I'm running
>> CentOS with all the latest yum updates.  It runs fine, but iptables
>> does not seem to be 'consistently' dropping the packets from the IP's
>> I've put a drop rule in for.   When I do iptables -L I still see the
>> rule in place:
>> 
>> iptables -L
>> Chain INPUT (policy ACCEPT)
>> target     prot opt source                     destination
>> RH-Firewall-1-INPUT  all  --  anywhere         anywhere
>> DROP       all  --  ip176-0.netcathost.com/24  anywhere 
>> 
>> With this rule in place and iptables running, I am now getting the
>> blocked IP's showing up in my apache logs again.  this used to work...
>> has something changed?
>> 

> Rather than posting the output of iptables -L, could you send the
> file /etc/sysconfig/iptables to the list.

> Also, what happens if you restart iptables? 

> /sbin/service iptables restart

> Any errors?

> Sean