On 23/06/2021 11:55, Robert McBroom via users wrote:
On 6/21/21 11:41 PM, Gordon Messmer wrote:
On 6/21/21 6:17 AM, Robert McBroom via users wrote:
@RobertPC ~]# mount -v -t nfs [fd2e:cb3b:f005::ec1]:/mnt/HD/HD_a2/mcstuffy 
/mnt/mcstuffy
mount.nfs: timeout set for Mon Jun 21 06:42:25 2021
mount.nfs: trying text-based options 
'vers=4.2,addr=fd2e:cb3b:f005::ec1,clientaddr=fd2e:cb3b:f005::ec1'
mount.nfs: mount(2): Connection refused


1: Is the nfs port open on ipv6?  Use "ss -ln | grep :2049" and look for a 
listening port with an IPv6 address, like:

tcp    LISTEN     0      64     [::]:2049 [::]:*

2: Does your firewall allow access to port 2049 on IPv6?  Use "firewall-cmd --list-services" and 
look for "nfs", or use "ip6tables -L" and look for the input chain for your default zone 
(possibly IN_public_allow).
BusyBox v1.30.1 (2020-09-04 02:41:28 UTC) built-in shell (ash)
Enter 'help' for a list of built-in commands.

root@MyCloudEX2Ultra ~ # ss -ln | grep :2049
-sh: ss: not found
root@MyCloudEX2Ultra ~ # firewall-cmd --list-services
-sh: firewall-cmd: not found
root@MyCloudEX2Ultra ~ # help
Built-in commands:
------------------
        . : [ [[ alias bg break cd chdir command continue echo eval exec
        exit export false fg getopts hash help history jobs kill let
        local printf pwd read readonly return set shift source test times

        trap true type ulimit umask unalias unset wait


root@MyCloudEX2Ultra ~ # ip6tables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
           tcp      anywhere             anywhere             tcp dpt:22 state 
NEW recent: SET name: SSH side: source mask: 
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
SSHBFATK   tcp      anywhere             anywhere             tcp dpt:22 state 
NEW recent: UPDATE seconds: 600 hit_count: 201 name: SSH side: source mask: 
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain SSHBFATK (1 references)
target     prot opt source               destination
LOG        all      anywhere             anywhere limit: avg 5/min burst 5 LOG level info 
prefix "SSH: Detect brute force atk! "
DROP       all      anywhere             anywhere

root@MyCloudEX2Ultra ~ # cat /etc/hosts
127.0.0.1 localhost localhost.localdomain
192.168.1.239 MyCloudEX2Ultra MyCloudEX2Ultra
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters


And you may also want to run nmap, as root, from your fedora system

nmap -sS -6 The-IPV6-address-here

and just to be sure of IPv4

nmap -sS The-IPV4-address-here


--
Remind me to ignore comments which aren't germane to the thread.

_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to