Cant access imap and smtp through ubuntu
Hello,
I have setup iptables rule for port 993, 465, 110, 143 in ubuntu 14.04 But still cant access google apps imap and smtp through clients like outlook express or ms outlook. Though it works if googleapps sync is working. Any ideas what is blocking them or how to correctly implement it. Internet is working all sites are working accept gmail. I am using squid3 proxy. Thanks Mitch |
For SMTP, you'll need to add port 25. Is your iptables running on the client? If so, you need to open these ports for OUTPUT traffic, not INPUT. Or is iptables running on a router/network gateway? {Please provide a bit more information and post the output of "iptables -L" on your system.
|
IPtables output
Hello,
We are using ssl ports 465 and 993 for accessing google apps mails. Clients are running on XP and they are using outlook express or MS Outlook to access mails. IPtables are only running on ubuntu server 14.04 which acts as a gateway and which is also a proxy squid3, but proxy has nothing to do with this. Here is the iptables -L output sudo iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ACCEPT tcp -- anywhere anywhere tcp dpt:ssh ACCEPT tcp -- anywhere anywhere tcp dpt:2222 ACCEPT tcp -- anywhere anywhere tcp dpt:http ACCEPT tcp -- anywhere anywhere tcp dpt:8000 ACCEPT tcp -- anywhere anywhere tcp dpt:imaps ACCEPT tcp -- anywhere anywhere tcp dpt:urd ACCEPT tcp -- anywhere anywhere tcp dpt:pop3 ACCEPT tcp -- anywhere anywhere tcp dpt:imap2 ACCEPT tcp -- anywhere anywhere tcp dpt:domain Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain ufw-after-forward (0 references) target prot opt source destination Chain ufw-after-input (0 references) target prot opt source destination Chain ufw-after-logging-forward (0 references) target prot opt source destination Chain ufw-after-logging-input (0 references) target prot opt source destination Chain ufw-after-logging-output (0 references) target prot opt source destination Chain ufw-after-output (0 references) target prot opt source destination Chain ufw-before-forward (0 references) target prot opt source destination Chain ufw-before-input (0 references) target prot opt source destination Chain ufw-before-logging-forward (0 references) target prot opt source destination Chain ufw-before-logging-input (0 references) target prot opt source destination Chain ufw-before-logging-output (0 references) target prot opt source destination Chain ufw-before-output (0 references) target prot opt source destination Chain ufw-reject-forward (0 references) target prot opt source destination Chain ufw-reject-input (0 references) target prot opt source destination Chain ufw-reject-output (0 references) target prot opt source destination Chain ufw-track-forward (0 references) target prot opt source destination Chain ufw-track-input (0 references) target prot opt source destination Chain ufw-track-output (0 references) target prot opt source destination sudo iptables -vnL Chain INPUT (policy ACCEPT 2738 packets, 280K bytes) pkts bytes target prot opt in out source destination 13371 1876K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 3968K 3048M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 109 4500 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 3 144 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 7 320 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 4753 242K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8000 1 40 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:993 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 1 40 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 1 40 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 3 128 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 Thanks Mitch |
All times are GMT -5. The time now is 08:41 PM. |