On 23/06/2021 11:55, Robert McBroom via users wrote:
On 6/21/21 11:41 PM, Gordon Messmer wrote:
On 6/21/21 6:17 AM, Robert McBroom via users wrote:
@RobertPC ~]# mount -v -t nfs [fd2e:cb3b:f005::ec1]:/mnt/HD/HD_a2/mcstuffy /mnt/mcstuffy mount.nfs: timeout set for Mon Jun 21 06:42:25 2021 mount.nfs: trying text-based options 'vers=4.2,addr=fd2e:cb3b:f005::ec1,clientaddr=fd2e:cb3b:f005::ec1' mount.nfs: mount(2): Connection refused
1: Is the nfs port open on ipv6? Use "ss -ln | grep :2049" and look for a listening port with an IPv6 address, like:
tcp LISTEN 0 64 [::]:2049 [::]:*
2: Does your firewall allow access to port 2049 on IPv6? Use "firewall-cmd --list-services" and look for "nfs", or use "ip6tables -L" and look for the input chain for your default zone (possibly IN_public_allow).
BusyBox v1.30.1 (2020-09-04 02:41:28 UTC) built-in shell (ash) Enter 'help' for a list of built-in commands.
root@MyCloudEX2Ultra ~ # ss -ln | grep :2049 -sh: ss: not found root@MyCloudEX2Ultra ~ # firewall-cmd --list-services -sh: firewall-cmd: not found root@MyCloudEX2Ultra ~ # help Built-in commands:
. : [ [[ alias bg break cd chdir command continue echo eval exec exit export false fg getopts hash help history jobs kill let local printf pwd read readonly return set shift source test times
trap true type ulimit umask unalias unset wait
root@MyCloudEX2Ultra ~ # ip6tables -L Chain INPUT (policy ACCEPT) target prot opt source destination tcp anywhere anywhere tcp dpt:22 state NEW recent: SET name: SSH side: source mask: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff SSHBFATK tcp anywhere anywhere tcp dpt:22 state NEW recent: UPDATE seconds: 600 hit_count: 201 name: SSH side: source mask: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Chain FORWARD (policy ACCEPT) target prot opt source destination
Chain OUTPUT (policy ACCEPT) target prot opt source destination
Chain SSHBFATK (1 references) target prot opt source destination LOG all anywhere anywhere limit: avg 5/min burst 5 LOG level info prefix "SSH: Detect brute force atk! " DROP all anywhere anywhere
root@MyCloudEX2Ultra ~ # cat /etc/hosts 127.0.0.1 localhost localhost.localdomain 192.168.1.239 MyCloudEX2Ultra MyCloudEX2Ultra ::1 localhost ip6-localhost ip6-loopback ff02::1 ip6-allnodes ff02::2 ip6-allrouters
And you may also want to run nmap, as root, from your fedora system
nmap -sS -6 The-IPV6-address-here
and just to be sure of IPv4
nmap -sS The-IPV4-address-here