On 13 Jul 2000, at 10:23, Seth Vidal wrote: > > Chain input (policy ACCEPT): > > target prot opt source destination ports > > DENY tcp ------ 0.0.0.0/0 myip > > * -> 111 > > DENY tcp ------ 0.0.0.0/0 myip > > * -> 515 > > that is the correct rule. > > so if the remote host is: 172.16.120.1 it should block it. try this > command - its the ipchains Checking system - you can check misc packets > against it. > > ipchains -C input -s remoteip portnumber -d yourip 515 -p 6 -i eth0 > > see what it tells you. > > and/or turn on your logging with -l and see whats REALLY going on :)
I flushed my rules and reinitialized them again.. now it's working ! :-) thanx > > > # rpcinfo -p > > program vers proto port > > 100000 2 tcp 111 portmapper > > 100000 2 udp 111 portmapper > > 545580417 1 udp 1000 ugidd > > 545580417 1 tcp 1002 ugidd > > I didn't really mean to HUP them b/c I'm not sure if the reregister after > a hup. > > do you have anything in /etc/exports? i restarted mountd en nfsd en now it's working! thanx all for help! Patrick --- Encryption: A powerful algorithmic encoding technique employed in the creation of computer manuals.

