Originally posted by: smp
ah .. that's what's wrong .. how do I go about opening up that port?
Here is a little snippet for your case that you may need to set up
---------------->8---------------------
EXTERNAL_INTERFACE="eth0"
EXT_IP="your.ip.address"
WEB_SERVER=$EXT_IP #because you are going to forward the request later with ipmasqadm
ANYWHERE="any/0"
UNPRIVPORTS="1024:65535"
#Acessing remote websites
ipchains -A output -i $EXTERNAL_INTERFACE -p tcp -s $EXT_IP $UNPRIVPORTS -d $ANYWHERE 80 -j ACCEPT
ipchains -A input -i $EXTERNAL_INTERFACE -p tcp ! -y -s $ANYWHERE 80 -d $EXT_IP $UNPRIVPORTS -j ACCEPT
#Allowing incoming requests to your LAN (for port 3450 in your case)
ipchains -A input -i $EXTERNAL_INTERFACE -p tcp -s $WEB_SERVER $UNPRIVPORTS -d $ANYWHERE 3450 -j ACCEPT
ipchains -A output -i $EXTERNAL_INTERFACE ! -y -p tcp -s $ANYWHERE 3450 -d $WEB_SERVER $UNPRIVPORTS -j ACCEPT
ipchains -A forward -i $EXTERNAL_INTERFACE -p tcp -s $WEB_SERVER $UNPRIVPORTS -d $ANYWHERE 3450 -j MASQ #we are allowing NAT forwarding of this request with ipchains
---------------->8---------------------
And I believe that should be all you should need for this particular feat. If you need to debug, add a "-l" at the end of each ipchain rule line. The messages it outputs should be posted on /var/log/debug, or /var/log/messages. I am not 100% sure. Thanks for the practice of this stuff, now that I am about to go back to using ipchains. . .
Hope this helps,
GL
/edit: Fixed typo