Solved

iptables on redhat 7.1

Posted on 2001-06-05
3
448 Views
Last Modified: 2010-04-20
i'm using redhat 7.1, and i have problem with iptables
everytime i want to use iptables, it always display this error message

/lib/modules/2.4.2-2/kernel/net/ipv4/netfilter/ip_tables.o: init_module: Device or resource busy
Hint: insmod errors can be caused by incorrect module parameters, including invalid IO or IRQ parameters/lib

/lib/modules/2.4.2-2/kernel/net/ipv4/netfilter/ip_tables.o: insmod /lib......../ip_tables.o failed

iptables 1.2.1a: can't initialize iptables table 'filter': iptables who? (do you need to insmod?) Perhaps iptables or your kernel needs to be upgraded

????
0
Comment
Question by:ichen
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 100 total points
ID: 6159371
That sounds like ipchains is loaded, which is the default configuration for RH 7.1. To fix, disable ipchains ("chkconfig --level 2345 ipchains off" or via linuxconf) and reboot. Note that iptables won't actually start at boot time until you create a config file (/etc/sysconfig/iptables), but after the reboot you should be able to do "iptables -L".
0
 
LVL 1

Author Comment

by:ichen
ID: 6162179
what do you mean by config file?
0
 
LVL 40

Expert Comment

by:jlevie
ID: 6164046
Well, iptables, like ipcahins, requires a configuation file to tell it what to do. When either are running they default to a filter set that passes everything, something like:

disorder> dwim iptables --list
Chain INPUT (policy ACCEPT)
target     prot opt source               destination        

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination        

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination        

You can see that no filtering is occuring because no rules have been specified manually or via a config file. You probably want to look at the HowTo's (http://netfilter.samba.org/unreliable-guides/) for an explanation of what you can do with iptables/NetFilter (i.e., what goes into the config file). And there are various "canned" config files on the Internet, http://mirkk.kurd.nu/~monmotha/firewall/index.php is one example.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now