Its probably xinetd actually. Swat is one of those ip services launched on demand by xinetd. The config file /etc/xinetd.d/swat is installed when you install the samba rpm but the service is disabled by default. (This also applies to telnet-server, wu-ftpd, etc.)
So, edit /etc/xinetd.d/swat and change 'disable=yes' to 'disable=no'. Then restart xinetd with '/etc/rc.d/init.d/xinetd restart' or '/sbin/service xinetd restart'.
OK.. If you are using the redhat firewall its still ipchains based even for version 7.1 . So you'd add some ipchains commands to your firewall script like these ...
I assumed that the connection to port 901 was from an unprivileged client port. Maybe that's not the case. Try again with exactly the same commands but completely remove the '1024:65535'. I.e. :
Also, where are you trying to use swat from, where is the firewall, and where would the swat server be running ? Is this 3 different machines, 2 , or just one with everything ?
The only from line is not in the swat config file, that is one of the first things i tried.
I have a home network running and the linux box the dmz host of the router, and i need me computer to be able to load swat within the lan.
I tried entereing that stuff with the 1024:65535 and it still didnt work. DO i have to save the changes to the ipchains beofre it will work, because i noticed that when i reboot linux those entrys diapper.
I've been using iptables for some time and have never used the RH firewall, but I believe it creates all the config files in /etc/sysconfig. I think there's a file /etc/sysconfig/ipchains and also files for each interface. For example, /etc/sysconfig/firewall.ifcfg-lo for the loopback interface. I suspect they are triggered via the sysv init system rather than from the actual /etc/rc.d/rc.sysinit boot-up script.
So, you could just try to configure the RH firewall using either 'lokkit' or 'gnome-lokkit' as commands for the latest one or 'firewall-config' for the one before that. If it doesn't make sense then you could either try to add some rules to the files used by the firewall (i.e. the /etc/sysconfig ones referred to above) or add them to a script of your own.
Easiest would be to add to commands to /etc/rc.d/rc.local . This iscript is designed for local customisation and is run right at the end of the boot process before you get the logon prompt. You'd just add the lines as shown before :
I've added a 'forward' rule there because I'm still not sure what's where in your setup.
And, yes, they do have to be in a file because they are not magically remembered as such - in fact all firewall scripts start by flushing existing chains anyway. Your only problem might be if the firewall scripts somehow ran again after normal sysinit then your rules in rc.local might be flushed away !
THis is what i got when i tried to add the forward one:
[root@mmax sysconfig]# ipchains -A forward -p tcp -d any/0 901 -j ACCEPT
Warning: you must enable IP forwarding for packets to be forwarded at all:
Use `echo 1 > /proc/sys/net/ipv4/ip_forward'
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.