I don't know a great deal about these things, so I could be mistaken, but it looks to me like your firewall is accepting all connections in all directions, so essentially it's behaving as if it's switched off. It oughtn't be stopping your services over the given ports; however, for security reasons you may wish to adjust it so as to block inbound access on ports you're not using (otherwise it might as well be turned off), for example by changing the policy for the INPUT chain to REJECT (run the following commands from a terminal with root privileges):
Code:
# iptables -P INPUT REJECT
Or by adding a final rule to the ruleset that will accomplish the same thing:
Code:
# iptables -A INPUT -j REJECT
Note that in both these cases you will want to allow explicitly any other ports that you are using, as well as telling it to allow established connections back through the net (so that outbound requests can get a response):
Code:
# iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
I stress that you should add this and any other "ACCEPT" rules
before adding a default deny rule (the second option above); any rules after the latter will not take effect (because no packets would ever make it that far down the chain, all having previously met the criteria for rejection).
You are advised to double-check the validity of this advice with your local manual.