And you may also want to run nmap, as root, from your fedora system
nmap -sS -6 The-IPV6-address-here
and just to be sure of IPv4
nmap -sS The-IPV4-address-here
FWIW,
[root@meimei ~]# nmap -sS -6 -p 2049 2001:b030:112f:2::53 Starting Nmap 7.80 ( https://nmap.org ) at 2021-06-23 14:51 CST Nmap scan report for 2001:b030:112f:2::53 Host is up (0.00039s latency).
PORT STATE SERVICE 2049/tcp filtered nfs
Means the firewall is blocking the port
[root@meimei ~]# nmap -sS -6 -p 2049 2001:b030:112f:2::53 Starting Nmap 7.80 ( https://nmap.org ) at 2021-06-23 14:47 CST Nmap scan report for 2001:b030:112f:2::53 Host is up (0.00018s latency).
PORT STATE SERVICE 2049/tcp closed nfs
Means the firewall is not blocking the port but no service is listening on that port
[root@meimei ~]# nmap -sS -6 -p 2049 2001:b030:112f:2::53 Starting Nmap 7.80 ( https://nmap.org ) at 2021-06-23 14:46 CST Nmap scan report for 2001:b030:112f:2::53 Host is up (0.00013s latency).
PORT STATE SERVICE 2049/tcp open nfs
Means the firewall is not blocking the port and a service is listening on the port