Reply to comment

nfsclient: 2.6.32-71.el6.x86_

nfsclient:
2.6.32-71.el6.x86_64
nfs-utils-1.2.3-7.el6.x86_64
nfs-utils-lib-1.1.5-3.el6.x86_64
nfs4-acl-tools-0.3.3-5.el6.x86_64

nfs_server:
2.6.18-164.el5
nfs-utils-1.0.9-42.el5
nfs-utils-lib-1.0.8-7.6.el5
nfs4-acl-tools-0.3.3-1.el5
I have yet to get NFS4 to work through a hardware firewall. tcpdump output is showing client originating mount on random ports.
tcpdump command used:
tcpdump -vv -x -X -i eth0 port 2049

Sample output:
[root@nfs_client ~]# tcpdump -vv -x -X -i eth0 port 2049
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
07:48:00.005079 IP (tos 0x0, ttl 64, id 31254, offset 0, flags [DF], proto TCP (6), length 60)
nfs_client.893 > nfs_server.nfs: Flags [S], cksum 0x504e (correct), seq 491207845, win 5840, options [mss 1460,sackOK,TS val 7358132 ecr 0,nop,wscale 7], length 0
0x0000: 4500 003c 7a16 4000 4006 8c52 0a0a 1e02 E..

Reply

Please refrain from adding URLs to unrelated or commercial websites. This site is moderated and comments with inappropriate links are rejected. Thank you for your understanding.
The content of this field is kept private and will not be shown publicly.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

More information about formatting options