The thought I have is what have you got in your /etc/hosts.deny and /etc/hosts.allow files? These can block NFS hosts connecting.
For completeness, here is what I see on my systems for rpcinfo.
Code:
/usr/sbin/rpcinfo -p
program vers proto port
100000 2 tcp 111 portmapper
100000 2 udp 111 portmapper
100024 1 udp 1027 status
100024 1 tcp 3329 status
100005 1 udp 654 mountd
100005 1 tcp 657 mountd
100005 2 udp 654 mountd
100005 2 tcp 657 mountd
100005 3 udp 654 mountd
100005 3 tcp 657 mountd
100003 2 udp 2049 nfs
100003 3 udp 2049 nfs
100003 4 udp 2049 nfs
100003 2 tcp 2049 nfs
100003 3 tcp 2049 nfs
100003 4 tcp 2049 nfs
100021 1 udp 1028 nlockmgr
100021 3 udp 1028 nlockmgr
100021 4 udp 1028 nlockmgr
100021 1 tcp 3923 nlockmgr
100021 3 tcp 3923 nlockmgr
100021 4 tcp 3923 nlockmgr
Make sure you have all the services running.
Here is what I have in /etc/hosts.deny file.
Code:
cat hosts.deny
#
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
# Copied exports, hosts.allow and hosts.deny from 9.2 March 19/06
portmap:ALL
lockd:ALL
mountd:ALL
rquotad:ALL
statd:ALL
ALL:ALL
and /etc/hosts.allow file
Code:
cat hosts.allow
#
# hosts.allow This file describes the names of the hosts which are
# allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
portmap: 192.168.1.20 , 192.168.1.21 , 192.168.1.22 , 192.168.1.23 , 192.168.1.13 , 192.168.1.12 , 192.168.1.15
lockd: 192.168.1.20 , 192.168.1.21 , 192.168.1.22 , 192.168.1.23 , 192.168.1.13 , 192.168.1.12 , 192.168.1.15
rquotad: 192.168.1.20 , 192.168.1.21 , 192.168.1.22 , 192.168.1.23 , 192.168.1.13 , 192.168.1.12 , 192.168.1.15
mountd: 192.168.1.20 , 192.168.1.21 , 192.168.1.22 , 192.168.1.23 , 192.168.1.13 , 192.168.1.12 , 192.168.1.15
statd: 192.168.1.20 , 192.168.1.21 , 192.168.1.22 , 192.168.1.23 , 192.168.1.13 , 192.168.1.12 , 192.168.1.15
sshd sshd1 sshd2 : 192.168.1.20 , 192.168.1.21 , 192.168.1.22 , 192.168.1.23 , 192.168.1.13 , 192.168.1.12 , 192.168.1.15
xinetd: 192.168.1.21
Note, the IP addresses are unique to my home network. Just make sure you are allowing all clients you want to allow.
Hope this helps.