Hi everyone,
I've been asked to configure a bridge server.

I did installation of 'AGTk3.2 beta 1' and configure the firewall port to be 
used as a bridge server.
However, if I use that, client's VIC doesn't show anything. (and other 
computer's captured video which is connected via the service manager.)
RAT does not show sound information of the others in the same venue.

To solve the problem, I turn off the firewall. There are still problems.
I don't know how I can solve this challenge.
I look forward to getting your response.

regards,
Sangil Choi
Attached 'firewall's open ports list in bridge server'.
==========================================================
Table: filter
Chain INPUT (policy ACCEPT)
num  target     prot opt source               destination
1    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state 
RELATED,ESTABLISHED
2    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0
3    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
4    ACCEPT     udp  --  0.0.0.0/0            224.0.0.251         state NEW udp 
dpt:5353
5    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpt:631
6    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:631
7    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpt:22
8    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:10000
9    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:10002
10   ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:10004
11   ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:11000
12   ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpt:20000
13   ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpt:20200
14   ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:20200
15   ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpts:50000:52000
16   ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpts:50000:52000
17   ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpts:5900:5920
18   ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpt:8000
19   ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:8000
20   ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpt:8002
21   ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:8002
22   ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp 
dpt:8006
23   ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state NEW udp 
dpt:8006
24   REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with 
icmp-host-prohibited

Chain FORWARD (policy ACCEPT)
num  target     prot opt source               destination
1    REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with 
icmp-host-prohibited

Chain OUTPUT (policy ACCEPT)
num  target     prot opt source               destination

==========================================================

Reply via email to