If you can try turning off your firewall (even if it looks good for me), while testing, /etc/init.d/iptables stop regards, Guillermo. On 7/12/06, Robert List <list06 at abbacomm.net> wrote: > > Did you check your logs to see what the error(s)s was/were? It will pretty > much tell you exactly what happened there. > > Then of course I do this when I deal with inetd or more specifically in > this > case xinetd... YMMV > > netstat -a | more > > then I would tailor some /etc/hosts.allow and /etc/hosts.deny files > > # > # hosts.deny This file describes the names of the hosts which are > # *not* allowed to use the local INET services, as decided > # by the '/usr/sbin/tcpd' server. > # > # The portmap line is redundant, but it is left to remind you that > # the new secure portmap uses hosts.deny and hosts.allow. In particular > # you should know that NFS uses portmap! > ALL:ALL > > And then > > # > # hosts.allow This file describes the names of the hosts which are > # allowed to use the local INET services, as decided > # by the '/usr/sbin/tcpd' server. > # > # in.tftpd in.telnetd sshd > # > in.tftpd: someipaddressornetworkhere > > what it sounds like is a SOURCE and/or destination ip address issue with > the > firewall or hosts.allow and hosts.deny files. > > - rh > > -- > Robert Hanson - Abba Communications > Computer & Internet Services > (509) 624-7159 - www.abbacomm.net > > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20060712/3ca387ed/attachment-0005.html>