Thats cool. Using the command line is the only way to go. That way you know what the heck is going on. I will give you some general information about iptables and how Redhat save configuration.
IPtables is constructed with rules in three chains. A chain has default policies. If no rules match in the chain the default policy is applied. To see what the rules are in the chain run
The default chains are INPUT,OUTPUT,FORWARD. A data packet falls into one of these as follows.
When a connection attempt is being made to the machine it is in the INPUT chain.
When a connection is been made from the machine it is in OUTPUT chain.
If the connection is being routed through the machine it is in the FORWARD chain.
When a match is made on a rule iptables jumps to the jump rule define with -j and stops checking the rules in that chain and follows the jump. The jump can be a default one ACCEPT,DENY,DROP or a user define chain.
Reviewing iptables dump in your previous post for an ftp connection attempt to the server we can see that the first (and only rule) matches are connection attempt and send us to the userdefined rule RH-Lokit-0-50-INPUT. The first rule in that chain matches are attempt. So the packet is accepted, but ftp also opens a ftp-data connection back to the machine.
Here is link describing the ftp protocal.
I think these will open ftp up for you.
iptables -A INPUT -p tcp --dport ftp -j ACCEPT
iptables -A INPUT -p tcp --dport ftp-data -j ACCEPT
iptables -A INPUT -p udp --dport ftp -j ACCEPT
iptables -A INPUT -p udp --dport ftp-data -j ACCEPT
iptables -A INPUT -p ALL -m state --state \ ESTABLISHED,RELATED -j ACCEPT
To save the changes you can run
This writes the rules to /etc/sysconfig/iptables and is reread when your run /etc/iptables start.
Hope this helps.