With the following iptable rules, I was unable to do an apt update and ping a website. Whats wrong with the rules? How to fix it? What is the exact rule to fix it?
Chain INPUT (policy ACCEPT) target prot opt source destination ACCEPT tcp -- anywhere anywhere tcp dpt:325 DROP all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination
Get rid of the DROP rule in the INPUT chain. It’s dropping virtually all traffic coming in to the machine, including responses to any traffic you send out.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.