Hello, On Tue, 22 Apr 2014, Patrick Shanahan wrote:
From the server, 192.168.1.3 egrep 192.168.1.10.*111 /var/log/firewall
I notice that the failed attempts were when the client (.10) used priviledged ports (under 1024) as source-ports. When it worked, unpriviledged ports were used.
What "rules" are of interest and how to show them?
Those on both machines from: iptables -vL input_int | egrep 'nfs|rpc' iptables -vL output_int | egrep 'nfs|rpc' iptables -vL input_ext | egrep 'nfs|rpc' iptables -vL output_ext | egrep 'nfs|rpc' -dnh -- [Malaysia is] a weird place, 'your alien planet should feel more peculiar than Kuala Lumpur' is a test few SF-writers pass. -- Thomas Womack -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org