Hi, make sure your rules are set to log any infringment and have a look in the logs to see what's happening.
If the type of ruleset is block everything then open up particular ports, use something that includes at the start:
# Remove all existing rules belonging to this filter
ipchains -F
# Set the default policy of the filter to deny.
ipchains -P input DENY
ipchains -P output REJECT
ipchains -P forward DENY
Then your filtering rules which allow access to ports, then at the end set logging to record anything that has fallen through to the bottom of the chain list...
#---------------------------------------------
# Enable logging for selected denied packets
ipchains -A input -i $EXTERNAL_INTERFACE -p tcp -j DENY -l
ipchains -A input -i $EXTERNAL_INTERFACE -p udp --destination-port $PRIVPORTS -j DENY -l
ipchains -A input -i $EXTERNAL_INTERFACE -p udp --destination-port $UNPRIVPORTS -j DENY -l
ipchains -A input -i $EXTERNAL_INTERFACE -p icmp --icmp-type 0:255 -j DENY -l
ipchains -A ouput -i $EXTERNAL_INTERFACE -p icmp --destination-port 0:255 -j DENY -l
ipchains -A output -i $EXTERNAL_INTERFACE -j REJECT -l
Depending on how your messaging is set up, these errors will appear at the end of /var/log/messages (see syslog.conf to see where things are being logged).
As a cheat and a good learning tool, see:
The firewall design tool will use an online questionnaire to design an ipchains script for you. It's very complete and complex but it's a good learning tool if you use it for nothing else.