Hello Allen,
I'm going to apologize ahead for talking really simply about this  - 
Linux systems are always listening for various services on certain ports 
such as the one you are using for azureus.  Of course you don't want the 
whole world to be able to send your system unsolicited information to 
these ports, hence the iptables firewall.  If you type netstat -ntlp 
you'll see what ports are listening.  The command /sbin/iptables -L 
illustrates what traffic (ACKs) is actually allowed through to the 
system 'unsolicited'.  I say unsolicited because packets that are a part 
of an Established (ESTB) session, are obviously allowed.  In other 
words, if you request a page from your browser, it's rightfully honored 
even though the webbrowser isn't running as a service with an open port 
per se.

Getting to the point, just turn off the iptables firewall for testing 
purposes by typing /sbin/service iptables stop .  Now any listening 
ports can be accessed from at least within it's own collision domain.  
The next step is to see if that port is accessible through your router, 
use the nmap command for that.  Figure out the ip address of the router 
(i.e. 67.1.2.3), then from the command line type nmap -O 67.1.2.3, and 
it will return the available ports.  Your port should be one of them.  
If not, look at the hardware router.





Allen Weiner wrote:
> On Sat, 2008-01-26 at 00:58 -0500, Michael Quick wrote:
>   
>> I am going to go out on a limb and assume that you never setup your 
>> router to port forward to your local host? I never used the program 
>> before but I tried it just now on my RHEL5 box and got it setup within 5 
>> mins. Assuming that "Testing port 5905 ... OK !" means it's working. For 
>> testing purpose, I forwarded the port on my Linksys and turned off my 
>> firewall..
>>
>> [EMAIL PROTECTED] ~]$ netstat -ntlp
>> Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
>> tcp 0 0 0.0.0.0:5905 0.0.0.0:* LISTEN 14214/java
>> ... ... ...
>>
>>
>>     
> I did setup my router to port forward TCP and UDP traffic for port
> 60112. (I can't guarantee I did this correctly.)
>
> When you say that you turned off your firewall, do you mean the hardware
> firewall on your router or your software firewall?
>
> If port forwarding was not set up on my router, would that cause the
> Azureus NAT test to fail?
>
>
>
> _______________________________________________
> Mid-Hudson Valley Linux Users Group                  http://mhvlug.org        
>      
> http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug                           
> Upcoming Meetings (6pm - 8pm)                         MHVLS Auditorium        
>           
>   Feb 6 - DBUS
>   Mar 5 - Setting up a platform-independent home/small office network using 
> Linux
>
>   

_______________________________________________
Mid-Hudson Valley Linux Users Group                  http://mhvlug.org          
   
http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug                           
Upcoming Meetings (6pm - 8pm)                         MHVLS Auditorium          
        
  Feb 6 - DBUS
  Mar 5 - Setting up a platform-independent home/small office network using 
Linux

Reply via email to