NFS mount -

Bob Goodwin - Zuni, Virginia, USA bobgoodwin at wildblue.net
Sat Nov 15 09:04:31 UTC 2014


On 11/15/14 02:22, Tom H wrote:
> On Fri, Nov 14, 2014 at 3:12 PM, Bob Goodwin - Zuni, Virginia, USA
> <bobgoodwin at wildblue.net> wrote:
>> I have a problem connecting this Fedora-20 computer with an NFS server. I
>> have just set up the server on Scientific Linux 7.
> ":/mnt/nasdata"?
Sorry, mistyped, an artifact from Freenas which I am replacing.
>
> On the server, what's the output of:
>
> systemctl status nfs*
[root at box48 ~]# systemctl status nfs*
nfs\x2a.service
    Loaded: not-found (Reason: No such file or directory)
    Active: inactive (dead)
>
> systemctl status rpc*
[root at box48 ~]# systemctl status rpc*
rpc\x2a.service
    Loaded: not-found (Reason: No such file or directory)
    Active: inactive (dead)
>
> systemctl status var*.mount
[root at box48 ~]# systemctl status var*.mount
var\x2a.mount
    Loaded: not-found (Reason: No such file or directory)
    Active: inactive (dead)
>
> exportfs
[root at box48 ~]# exportfs
/nfs4exports      192.168.1.0/24
/nfs4exports/data
         192.168.1.0/24
/nfs4exports/home
         192.168.1.0/24
>
> rpcinfo -p
[root at box48 ~]# rpcinfo -p
    program vers proto   port  service
     100000    4   tcp    111  portmapper
     100000    3   tcp    111  portmapper
     100000    2   tcp    111  portmapper
     100000    4   udp    111  portmapper
     100000    3   udp    111  portmapper
     100000    2   udp    111  portmapper
     100024    1   udp  59970  status
     100024    1   tcp  48757  status
     100005    1   udp  20048  mountd
     100005    1   tcp  20048  mountd
     100005    2   udp  20048  mountd
     100005    2   tcp  20048  mountd
     100005    3   udp  20048  mountd
     100005    3   tcp  20048  mountd
     100003    3   tcp   2049  nfs
     100003    4   tcp   2049  nfs
     100227    3   tcp   2049  nfs_acl
     100003    3   udp   2049  nfs
     100003    4   udp   2049  nfs
     100227    3   udp   2049  nfs_acl
     100021    1   udp  44643  nlockmgr
     100021    3   udp  44643  nlockmgr
     100021    4   udp  44643  nlockmgr
     100021    1   tcp  58822  nlockmgr
     100021    3   tcp  58822  nlockmgr
     100021    4   tcp  58822  nlockmgr
     100011    1   udp    875  rquotad
     100011    2   udp    875  rquotad
     100011    1   tcp    875  rquotad
     100011    2   tcp    875  rquotad

>
> iptables -nL (or iptables -S)
[root at box48 ~]# iptables -S
-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT
-N FORWARD_IN_ZONES
-N FORWARD_IN_ZONES_SOURCE
-N FORWARD_OUT_ZONES
-N FORWARD_OUT_ZONES_SOURCE
-N FORWARD_direct
-N FWDI_public
-N FWDI_public_allow
-N FWDI_public_deny
-N FWDI_public_log
-N FWDO_public
-N FWDO_public_allow
-N FWDO_public_deny
-N FWDO_public_log
-N INPUT_ZONES
-N INPUT_ZONES_SOURCE
-N INPUT_direct
-N IN_public
-N IN_public_allow
-N IN_public_deny
-N IN_public_log
-N OUTPUT_direct
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -j INPUT_direct
-A INPUT -j INPUT_ZONES_SOURCE
-A INPUT -j INPUT_ZONES
-A INPUT -p icmp -j ACCEPT
-A INPUT -j REJECT --reject-with icmp-host-prohibited
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i lo -j ACCEPT
-A FORWARD -j FORWARD_direct
-A FORWARD -j FORWARD_IN_ZONES_SOURCE
-A FORWARD -j FORWARD_IN_ZONES
-A FORWARD -j FORWARD_OUT_ZONES_SOURCE
-A FORWARD -j FORWARD_OUT_ZONES
-A FORWARD -p icmp -j ACCEPT
-A FORWARD -j REJECT --reject-with icmp-host-prohibited
-A OUTPUT -j OUTPUT_direct
-A FORWARD_IN_ZONES -i enp2s0 -g FWDI_public
-A FORWARD_IN_ZONES -g FWDI_public
-A FORWARD_OUT_ZONES -o enp2s0 -g FWDO_public
-A FORWARD_OUT_ZONES -g FWDO_public
-A FWDI_public -j FWDI_public_log
-A FWDI_public -j FWDI_public_deny
-A FWDI_public -j FWDI_public_allow
-A FWDO_public -j FWDO_public_log
-A FWDO_public -j FWDO_public_deny
-A FWDO_public -j FWDO_public_allow
-A INPUT_ZONES -i enp2s0 -g IN_public
-A INPUT_ZONES -g IN_public
-A IN_public -j IN_public_log
-A IN_public -j IN_public_deny
-A IN_public -j IN_public_allow
-A IN_public_allow -d 224.0.0.251/32 -p udp -m udp --dport 5353 -m 
conntrack --ctstate NEW -j ACCEPT
-A IN_public_allow -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW 
-j ACCEPT



Thanks for looking at this,

Bob

-- 
http://www.qrz.com/db/W2BOD
box10  Fedora-20/64bit Linux/XFCE



More information about the users mailing list