I ran into the same issue with my pidora. I realized that Pidora (because it is a "recent" fedora distro) runs firewalld for security handling, as well. And it appears as it overwrites or preempts iptables at boot time.
For normal iptables, edits and add entries must be saved /etc/sysconfig/iptables file, via the save command
Quote:
/sbin/service iptables save
|
/sbin/service iptables save
You'll see that the file is created and edited; but after reboot it isn't getting the changes either.
Check firewalld and firewall-cmd... to see if it's enabled do:
Code:
[root@pi ~]# systemctl status firewalld.service
firewalld.service - firewalld - dynamic firewall daemon
Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled)
Active: active (running) since Fri, 2013-05-17 14:48:00 EDT; 2 months and 2 days ago
Main PID: 133 (firewalld)
CGroup: name=systemd:/system/firewalld.service
└ 133 /usr/bin/python /usr/sbin/firewalld --nofork
To show which services/ports are enabled via firewalld use
Code:
[root@pi ~]# firewall-cmd --list-services
mdns dhcpv6-client ssh
[root@pi ~]#
An example to permanently accept http and https sessions thru the "Public" zone (which in my case is eth0), you have to run:
Code:
[root@pi ~]# firewall-cmd --zone=public --add-service=https --permanent
[root@pi ~]# firewall-cmd --zone=public --add-service=http --permanent
See if that helps, it worked for me.