First off, you'll probably want to know what port(s) <x>meeting uses. The easiest way to see what's really going on is to enable logging on the firewall and see if it's blocking packets from your friend's IP and on what port they're arriving / destined for.
(The following assumes you have iptables support in the kernel with LOG target support.)
This is from my firewall / router:
Code: Select all
shingi root # iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
*** A BUNCH OF ALLOW RULES ARE HERE ***
block all -- anywhere anywhere state INVALID,NEW
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain block (1 references)
target prot opt source destination
LOG all -- anywhere anywhere LOG level warning prefix `REJECT '
DROP all -- anywhere anywhere
You can see I added a new chain called 'block'. This rule is applied after specific services are allowed through (i.e. last). If no ALLOW rule applies, the 'block' rule will and it "jumps" to the 'block' chain. Once there, it logs the packet to syslog and DROPs it, effectively giving me a basic method of viewing what gets denied.
To get a FULL view of what's going on, you can create a chain that is applied *first* and applies to any source / dest that simply LOGs the packet and jumps to 'ACCEPT' (or whatever your security policy dictates). BE VERY CAREFUL WHEN DOING THIS as it can open up your firewall. If you want to be super careful, you can do it as I have and default to DROP so anything that is not explicitly allowed is denied. (Of course, not all of my rules are shown for my own security purposes).
As for the syntax of adding, removing, and showing rules, the 'iptables --help' is fairly simple to grok. Here's a quick version, BUT READ THE DOCS FIRST as you should always know what you're doing in terms of security to your firewall:
Code: Select all
# iptables --new mylogger
# iptables -L
** OTHER STUFF ***
Chain mylogger (0 references)
target prot opt source destination
# iptables -A mylogger -j LOG --log-level warning --log-prefix 'iptables reject:'
# iptables -I FORWARD 1 -j mylogger
Your /var/log/messages file should start scrolling. Get your info from there.
Be careful. Read the iptables docs.
Hope this helps (and I hope it's not too confusing)