Displaying 20 results from an estimated 30000 matches similar to: "firewall setup for nfs"
2012 Oct 24
2
Why portmap is needed for NFSv4 in CentOS6
Hi all,
I have setup a CentOS6.3 x86_64 host to act as a nfs server.
According to RHEL6 docs, portmap is not needed when you use NFSv4, but
in my host I need to start rpcbind service to make NFSv4 works.
My /etc/sysconfig/nfs
#
# Define which protocol versions mountd
# will advertise. The values are "no" or "yes"
# with yes being the default
MOUNTD_NFS_V2="no"
2010 Feb 18
3
NFS client firewall config?
Hi all,
Which ports do I need to have open on an NFS client's firewall to allow it
to connect to a remote NFS servers?
When I disable iptables (using ConfigServerFirewall), it connects fine, but
as soon as I enable it, NFS gives me this error:
root at saturn:[~]$ mount master1.mydomain.co.za:/saturn /bck
mount: mount to NFS server 'master1.mydomain.co.za' failed: RPC Error:
Unable to
2011 May 31
1
Unable to mount Centos 5.6 Server via nfs4 - Operation Not Permitted - MADNESS!
After getting a reasonably configured NFS4 setup working on my Scientific Linux server, I spent a majority of my evening trying to do the same with my Centos 5 box, with fruitless results. Most attempts to mount that server returns the following message:
[root at sl01 log]# mount -t nfs4 192.168.15.200:/opt/company_data /mnt
mount.nfs4: Operation not permitted
As nearest as I can tell, I was
2011 Jan 04
9
Netinstall & NFS using local server.
Dear CentOS community,
I have install centos via CD, DVD and Directly off the net via http and FTP. Now I want to do a NFS install from a local server and a client. Both, client and server are in the same vlan 10.14.10.0/255.255.255.0.
The server has a static 10.14.10.15 address and the client gets its own address via DHCP. I download the DVD image from one of the mirrors and placed it under
2008 Jun 03
2
firewalled NFS
Hi,
I'm trying to setup a firewalled NFS server. I've configured my server
(CentOS 5) using the following parameters
/etc/sysconfig/nfs
MOUNTD_NFS_V1="no"
MOUNTD_NFS_V2="no"
RQUOTAD_PORT=875
LOCKD_TCPPORT=32803
LOCKD_UDPPORT=32769
RPCNFSDCOUNT=64
MOUNTD_PORT=892
STATD_PORT=662
STATD_OUTGOING_PORT=2020
SECURE_NFS="yes"
modprobe.conf:
options lockd
2006 Sep 30
2
firewall issue
Hello everyone,
I am setting up a new system for use as a testing/demo/trial-and-error
system. I have installed CentOS 4.4 on it. There is not an
X-environment, so I will need to fix this from the command line (via ssh
access).
I am trying to do an nfs export from this box to another on my internal
home network. I have figured out that it is a firewall issue on the
CentOS box (I turn off the
2009 Aug 03
3
firewall question
My firewall config is below...
I am trying to figure out why another machine has access to port 5038 on
my machine
based on these firewall rules.
I thought the reject at the bottom would take care of all other ports?
It does not.
I have restarted with "server iptables restart" and same thing. I can
connect from another machine
to my machine on port 5038. How do I prevent this?
2009 Dec 28
2
NFS problem
I'm trying to NFS-mount a CentOS directory on my Fedora laptop,
but I find I can only do this is I turn off the firewall
on the CentOS server.
If instead I go to system-config-securitylevel-tui on the server,
and allow NFS4, this does not do the trick.
Nor does allowing port 2049.
What do I need to allow?
[I should say that the CentOS server is remote,
and difficult to access directly;
that
2007 Oct 10
2
NFS and Firewall
Hi Folks,
I'm using VMWare on a Linux Host (CentOS) with a Linux-Guest Sidux).
And I'd like to use NFS.
Furthermore I'd like to use the Firewall in CentOS with this little GUI.
If I activate this firewall then my Guest says "no route to host" on mounting
nfs.
Firewall disabled -> no problem occurs.
Is there a solution to use firewall _and_ nfs ?
Please, no iptables
2009 Jul 04
3
[Fwd: Re: Getting started with NFS]
An embedded message was scrubbed...
From: Niki Kovacs <contact at kikinovak.net>
Subject: Re: [CentOS] Getting started with NFS
Date: Sat, 04 Jul 2009 10:33:31 +0200
Size: 1377
URL: <http://lists.centos.org/pipermail/centos/attachments/20090704/b8ff2d37/attachment-0003.eml>
2008 Feb 26
1
/etc/sysconfig/iptables on a stock CentOS 5 install
Greetings:
i have a pretty stock CentOS 5 machine with ports 80 and 22 exposed, so
my /etc/sysconfig/iptables file is pretty standard/straightforward.
my question is: how is this config file initially generated? i'd
like to
re-create it, and add a couple of rules .... so i don't want to lose
what's
in there already.
i see that my /etc/sysconfig/system-config-securitylevel has
2011 Mar 30
2
nlockdmgr listen on privileged port
hey list!
I am attempting to shore up some centos machines (ranging from centos
5 to centos 5.4) for pci compliance by changing the port that
nlockdmgr listens on to function under a privileged port.
So what I did was try to hardcode the port by editing /etc/sysconfig/nfs
# TCP port rpc.lockd should listen on.
LOCKD_TCPPORT=1011
# UDP port rpc.lockd should listen on.
LOCKD_UDPPORT=1011
#
2008 Apr 07
1
NFS, acls, proto, and "kernel: svc: unknown version"
Hi all,
1) My NFS3 clients don't display or obey existing non-POSIX ACLs on
files of NFS3-mounted exports.
2) setfacl on the client throws error and fails :
# setfacl -m u:stowler:rw testfile.text
setfacl: testfile.text: Operation not supported
3) at time of client mount the server's /var/log/messages shows
"kernel: svc: unknown version (3)".
Any thoughts greatly
2023 Feb 15
1
ctdb tcp kill: remaining connections
Hi Uli,
[Sorry for slow response, life is busy...]
On Mon, 13 Feb 2023 15:06:26 +0000, Ulrich Sibiller via samba
<samba at lists.samba.org> wrote:
> we are using ctdb 4.15.5 on RHEL8 (Kernel
> 4.18.0-372.32.1.el8_6.x86_64) to provide NFS v3 (via tcp) to RHEL7/8
> clients. Whenever an ip takeover happens most clients report
> something like this:
> [Mon Feb 13 12:21:22
2007 Jun 07
2
Standard RH iptables analysis
This is a standard RedHat / CentOS firewall configuration, where I
told it, through the standard RH setup GUI, that I want ssh and
snmp allowed through.
Chain INPUT (policy ACCEPT)
target prot opt source destination
RH-Firewall-1-INPUT all -- anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source
2009 Mar 01
2
Fail2Ban
Hi all,
I am trying to get fail2ban going on my server and its log message
reports the following error
2009-02-16 17:42:05,339 ERROR: 'iptables -L INPUT | grep -q
fail2ban-SSH' returned 256
2009-02-16 17:42:05,354 ERROR: 'iptables -D INPUT -p tcp --dport ssh
-j fail2ban-SSH
Is this because of the way the RedHat tool sets up the firewall?
Thanks for any responses.
--
"The
2009 Mar 31
4
Samba and iptables - woes
Hi folk,
I am trying to get iptables working on a samba server but find it is
blocking something that prevents the windoze clients from being able to
access the share.
here are the bits from iptables:
> # nmb provided netbios-ns
> -A RH-Firewall-1-INPUT -p udp -m udp -s 192.168.230.100/24 -i eth1
> --dport 137 -j ACCEPT
> # nmb provided netbios-dgm
> -A RH-Firewall-1-INPUT -p udp
2008 Jul 10
3
Iptables not blocking UDP port 53
I'm attempting to block access to port 53 from internet hosts for an
internal server. This device is behind a gateway router so all
traffic appears to come from source ip 10.100.1.1. Here are my
(non-working) iptables rules:
-A RH-Firewall-1-INPUT -s 10.100.1.1 -m tcp -p tcp --dport 53 -j REJECT
-A RH-Firewall-1-INPUT -s 10.100.1.1 -m udp -p udp --dport 53 -j REJECT
Further down the
2009 Sep 15
2
iptables
Hi,
I have an existing iptables as follows:-
# Firewall configuration written by system-config-securitylevel
# Manual customization of this file is not recommended.
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p
2009 Jun 27
1
2 problems I can't solve without any help
Problem 1 :
Incoming conversations from the SIP-provider come into the
[default]-context and to the 's'-extension.
I am unable to change this, even if I have :
sip.conf
[general]
;context=default ; Default context for incoming calls
register => 092779077:XXXX at 85.119.188.3
; incoming
[092779077]
type=user
host=85.119.188.3
context=from3starsnet
So I define no