[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Network config - RPC timeout - what have I missed?



Hi,

I am setting up box pigeon as an NFS server from which to install
woody on box nestie via ethernet. I am attempting to make
/scsidrive/woody[1..7] available for export. Box nestie isn't up at
all yet, so I'm trying to test it by mounting the exported filesystem
locally.

I intend for pigeon to be 192.168.1.1, nestie to be 192.168.1.2. I can
ping both 127.0.0.1 and 192.168.1.0. If I try

mount 127.0.0.1:/scsidrive/woody1 /mnt -t nfs

it works, but if I try

mount 192.168.1.1:/scsidrive/woody1 /mnt -t nfs

I get "mount: RPC: Timed out". By messing with the permissions in
/etc/exports or removing my entries in /etc/hosts.allow and
/etc/hosts.deny, I can change this to a "permission denied by server"
error. So some of it's working...

I must have missed something, any ideas what? I have set up the
following: (see below)

TIA,
Pigeon

#/etc/networks
loopnet 127.0.0.0
pigeonloft 192.168.1.0

#/etc/init.d/network
#! /bin/sh
ifconfig lo 127.0.0.1
route add -net 127.0.0.0
ifconfig eth0 192.168.1.1 netmask 255.255.255.0 up
route add -net 192.168.1.0 netmask 255.255.255.0 eth0

# /etc/exports: the access control list for filesystems which may be exported
#		to NFS clients.  See exports(5).
# this is for testing...
/scsidrive/woody1   pigeon(insecure)
# these (plus woody1) are what I intend to export when it's working
/scsidrive/woody2   nestie(ro)
/scsidrive/woody3   nestie(ro)
/scsidrive/woody4   nestie(ro)
/scsidrive/woody5   nestie(ro)
/scsidrive/woody6   nestie(ro)
/scsidrive/woody7   nestie(ro)

#/etc/hosts
127.0.0.1	pigeon	localhost
192.168.1.1 pigeon

# /etc/hosts.allow: list of hosts that are allowed to access the system.
#                   See the manual pages hosts_access(5), hosts_options(5)
#                   and /usr/doc/netbase/portmapper.txt.gz
#
# Example:    ALL: LOCAL @some_netgroup
#             ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#
rpc.mountd : 192.168.1

# /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
#                  See the manual pages hosts_access(5), hosts_options(5)
#                  and /usr/doc/netbase/portmapper.txt.gz
#
# Example:    ALL: some.host.name, .some.domain
#             ALL EXCEPT in.fingerd: other.host.name, .other.domain
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#
# The PARANOID wildcard matches any host whose name does not match its
# address.
#ALL: PARANOID
rpc.mountd : ALL

# /etc/services:
# <snip standard slink entries>
# Local services
# Does This Help? test, using info from rpcinfo -p
# (doesn't seem to make any difference)
nfs         2049/tcp
nfs         2049/udp
mountd       938/udp
mountd       941/tcp



Reply to: