Why isn't my linux firewall opening ports?

1 Answer

Answer :

I’m not sure what Linux distribution you’re using and I don’t have that much experience with firewalls, and especially not with command line firewalls, but Ubuntu includes “ufw” which supposedly is a far easier front-end to iptables which you might find easier too.

Related questions

Description : What causes (except once in while emergency related) forced overtime work?

Last Answer : An inability to find skilled workers to handle the workload, despite efforts to recruit more workers. That is why a lot of police departments and hospitals and fire departments have mandatory overtime.

Description : What can you tell me about nonprofit status? Specifically, negotiating a public charity vs. private foundation status for a theatre company?

Last Answer : Get a grant writer / 501 ( C ) 3 specialist, I'm in an organization that recently changed to a non-profit. It cost us only $250 for the specialist she collated all of our meeting minutes for many years, ... and it took us 9 months from filing to receive the non-profit status as a 501 ( C ) 3.

Description : How can we end religious fanaticism around the world?

Last Answer : Oppose belief based solely of faith (the lack of any evidence) in favor of belief based on the weight of evidence.

Description : Romney's selection of Paul Ryan. Are you any more likely to vote for him?

Last Answer : I am not voting for Romney, so it doesn’t matter to me who he selects. I honestly can’t see that this choice would be a deal breaker for many. Most voters have probably already made up their mind about the candidates.

Description : How long did it take you to get back your claim using the VA's BDD program?

Last Answer : I’ve never heard it called BDD (it could have been called that but I’m not much of a paperwork guy). If you’re referring to disability, I began getting mine within 6 months (probably more like 3) of doing the physical.

Description : What's the most appropriate server OS for my needs?

Last Answer : answer:If it needs to be Windows Server 2000 or 2003, I believe windows 2000 has reached the end of its support lifecycle. Therefore you're kind of stuck with a 2003 R2 server. What is it the server is ... has to be a windows server? A Red hat/CentOS might be a cheaper, and more viable solution.

Description : Sustainable Development Grad School programs?

Last Answer : According to wikipedia The Center for Sustainable Global Enterprise at Cornell University and the Erb Institute for Global Sustainable Enterprise at the University of Michigan are both working with the United ... help meet some of their goals. See the article for a listing of more suggestions.

Description : (Fiction question) My protagonist is a founder of some universities. How does he inflation-proof his universities?

Last Answer : He will advertise worldwide to anywhere that speaks English, to draw in students all over the world to study at KIT. The coffee and school-supply shops on the first floors of nearly every building will ... will charge by-the-pound to take food out of the facilities. That will be another profit pipe.

Description : I need Protec's Milenium Designer tutorial, user guide?

Last Answer : Milenium Designer 5 is based on Xpress same tools and functions. If you are used to xpress you can work with milenium, too. Milenium Designer 5 you can use on Mac and PC. The biggest difference is that ... with, or the firm you bought it)... its easy and like xpress where are you working with it?

Description : What do you think of Obama's cabinet choices so far?

Last Answer : I find the treasury secretary pick very interesting. The federal reserve and IMF are the problem, not the solution. There is no change. Obama is no different than Bush or Clinton. He is just continuing the agenda of the people that really run the country.

Description : If someone gives me access to their Google analytics account, will I be able to access their gmail?

Last Answer : The administrator can add users to allow access to Analytics. This doesn’t allow access to their email.

Description : Billings: How do you send a 'normal' (non-timed) invoice for sold inventories on a flat-fee basis?

Last Answer : answer:Create a new slip and set it's Kind' as Flat'. Then in put the unit price in the rate field and add one hour to the log. I don't know if that's how you're supposed to do it, ... but if you change it to decimal, you'll end up with a more normal looking quantity figure for fixed-price items.

Description : The first type of firewall was the packet filter which looks at: a) network addresses b) Ports of the packet and determines if that packet should be allowed or blocked c) Both of above d) None of These

Last Answer : c) Both of above

Description : Why isn't iphoto opening on my mac?

Last Answer : I would take it to the Apple store and see what the problem is. Besides that, you should be able to access your pictures from places->pictures.

Description : Why isn't it opening!

Last Answer : I can’t even right click on anything

Description : If my DDWRT SPI firewall is enabled on the router, do I need to also engage the Windows (or another) firewall?

Last Answer : Here’s good article on this topic why you need separate firewall on how to geek

Description : A question for Computer Scientists: How feasible is an "offensive firewall"?

Last Answer : answer:Very feasible, you can fire off just about anything you want with existing firewalls and software for whatever conditions you want to look for. But it has the same risk/reward as any attack. You don’t get a pass for attacking a government network because they probed your network first.

Description : Could someone give me a step by step guide for using my windows firewall (or something that will do the job) to block certain programs from transferring and receiving data across the web?

Last Answer : Download and install comodo internet security After installation, open it, go to the “firewall” tab, click “define new blocked application”, select -> browse, then select the executable file you want to block, -> click “apply” -> done

Description : What is the "core networking" in my firewall exceptions list, and should it be checkmarked?

Last Answer : Each Windows Firewall exception is involved with some bit of functionality that you will lose if they are turned off. Basic TCP/IP traffic such as DHCP, DNS, ICMP, Group Policy, and so on are supported ... rule group are disabled, your machine can't talk on the network. Make sure that it's enabled.

Description : Should I put my Xbox in the DMZ, or entirely behind the firewall, or does it make no difference at all?

Last Answer : I DMZ my Xbox to connect to my friends, although from what I hear, it’s not exactly a good thing to do. It’s the only solution that I’m smart enough to figure out. I tried port forwarding but had no idea what I was doing. Then again, I’m not a network guru or anything…

Description : Windows XP firewall won't turn on?

Last Answer : Bazooooooooooooooooooooooooooooooooooooooooooooooka to M$ should help with things .

Description : Help with Webroot Desktop Firewall?

Last Answer : I reached my question asking max, but I have a URGENT question: I have the TRIAL for webroot anti-virus, and its telling my I cant quarantine my items because its a trial. I HAVE 2 VIRUSES, ... I'll proabably buy the program tommorow, but I cannot leave the viruses on my computer until then! HELP!

Description : Experienced PC security enthusiasts: What AV/Firewall/Spyware combo have you found to offer the best protection?

Last Answer : I use PCTools Firewall and AntiVirus, as well as ThreatFire and Ad-Aware. So far so good. I’ve been through dozens of FW and AV programs, and I could easily tell you which ones DON’T work. Anything made/sold/offered by Symantec

Description : What is the best anti-virus/anti-spyware/anti-hacking & firewall program (free or not free) out there for APPLE MAC?

Last Answer : OSX. There are still 0 confirmed viruses for Macs running OSX. There are a couple Trojans, apparently, but you’d have to go looking for them to find them – and be pretty stupid to actually get infected by them. So, I wouldn’t consider it a problem worth worrying about on a Mac. Enjoy!

Description : Firewall: (a) Amplifies weak outgoing signals to stronger ones -Technology

Last Answer : (d) A firewall can either be software based or hardware based and is used to prevent intruders from accessing your system.

Description : What is a firewall? -Technology

Last Answer : A firewall is a program or hardware device that filters the information coming through an internet connection to a network or computer system. If incoming information does not pass the rules stored in the firewall, it is not allowed through.

Description : What is a firewall? -Technology

Last Answer : A firewall is a program or hardware device that filters the information coming through an internet connection to a network or computer system. If incoming information does not pass the rules stored in the firewall, it is not allowed through.

Description : What is Firewall ?

Last Answer : Every computer or network has its own security system. No one can break through this wall. This invisible wall of security is called fire wall.

Description : I found this in the Package Rules menu:

Last Answer : answer:

Description : Or is it good to install another one? I'm sorry, but it's my first computer, so I'm asking.

Last Answer : FireWall is not an antivirus. Download and install a real antivirus - I use Avast! free version (http://www.avast.com/cs-cz/download-thank-you.php?product=FAV-ONLINE&locale=cs-cz), but you will definitely get recommendations for others ...: o

Description : Is it important to have it turned on?

Last Answer : Yes, the Firewall should be turned on, its task is to protect the internal network from attacks from nearby networks.

Description : Which is the best real time firewall plugin for wordpress file uploads?

Last Answer : Sucuri Security – Auditing, Malware Scanner and Security Hardening. iThemes Security. Wordfence Security. WP fail2ban. All In One WP Security & Firewall. Jetpack. SecuPress. BulletProof Security.

Description : What is value of using access control database transaction and firewall log files?

Last Answer : Need answer

Description : Should i turn on my home computer firewall?

Last Answer : You should always have a firewall program running. Anti-virusprograms can only do so much !

Description : The Importance Of Good Firewall Protection?

Last Answer : There's an old saying that an ounce of prevention is worth apound of cure. This is never demonstrated so convincingly as it isin the case of the internet firewall. This type of ... upload somethingmalicious to destroy your computer.A firewall is one of the first applications that should bein

Description : How to Install a Firewall Appliance?

Last Answer : Just like locks and burglar alarms are important for protectingyour home, a firewall is an integral part of protecting yournetwork and servers. If you're housing a lot of data for yourworkplace or just ... a little higher in price as well. Make sureyou stick with reputable brands, also, because y

Description : Who are the top firewall software manufacturers?

Last Answer : Norton and McAfree are top firewall software manufacturers. You can read reviews and the products at personal-firewall-software-review.toptenreviews.com

Description : Does a Network Bridge have it's own hardware firewall like a router?

Last Answer : A network bridge usually doesn't come with a firewall, just the router.

Description : Does a Network Hub have a hardware firewall?

Last Answer : Some network hubs have them installed for protection

Description : How effective is a firewall protection?

Last Answer : A strong and upgraded firewall protection acts as a virtual barrier that defends external and internal damages from cyber attacks. Installing a powerful firewall protection on your system or network, provides ... on a network. A network-based firewall is also referred as a virtual firewall service.

Description : Use A Firewall To Keep Hackers Out?

Last Answer : There are always hackers who are looking for ways to get into any exchange serve that they think they can access. You need to keep them out at all times, especially if this server is located at a ... not have the right access codes. It can also block automated programs that hackers may have set up.

Description : Does ZoneAlarm free firewall really work?

Last Answer : ZoneAlarm Free Firewall has it's own website for you to explore. There is alot of information provided on the website which should be able to answer any questions that you have. Go to www.zonealarm.com and download the software for free and give it a try.

Description : What is a firewall?

Last Answer : Firewall is a network security system which helps in protecting your network from unauthorized accesses. It averts malignant access from computers outside the network. A firewall also works when you want ... and can be later customized as per needs for getting control over features and security. 

Description : What do you mean by a Firewall?

Last Answer : Firewall is a concept of a security system that will helps computers to protect it with unauthorized access or any cyber-attack.

Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above

Last Answer : a) Encryption

Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies

Last Answer : c) Firewall

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network