Wichita's largest indoor sports and adventure facility. Trampolines, basketball, volleyball, parties and events all under one roof. First give a -p option like -p tcp or -p udp.

Understanding the Context

Examples: iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j DROP iptables -A INPUT -p udp --dport 53 --sport 1024:65535 -j ACCEPT You could also try -p all but I've never done that and don't find too much support for it in the examples. with "u32 match ip sport 80" in Linux tc I can match port 80, but how can I match a port range 10000 - 20000 ? Attempting to add the ip rule add for UDP because the system is hosting a webserver which uses UDP for downloading content it seems. ip rule add from 0.0.0.0/32 ipproto udp sport 8080 to 192.168.200.0/24 lookup 1000 Error: argument "ipproto" is wrong: Failed to parse rule type ip route get ipproto udp sport 8080 to 192.168.200.200 Error: any ...

Key Insights

let's look at these two iptables rules which are often used to allow outgoing DNS: iptables -A OUTPUT -p udp --sport 1024:65535 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A -A OUTPUT -p tcp -m tcp --sport 8080 -m state --state NEW,ESTABLISHED -j ACCEPT Because your OUTPUT rules block output packets to non-allowed ports, it's allow only access to port 8080.