← Back to all network ports
TCP/UDP
Vulnerable

2049 NFS

NFS exports remote filesystems to Unix and Linux hosts over trusted internal networks.

Security Context

Port 2049 is high-risk when broadly exposed. Treat it as an attack-surface decision, not just a connectivity setting, and confirm whether the listener truly needs to be reachable.

  • !Broad NFS exposure can leak filesystems and trust boundaries.

Nmap Check

Use a version probe first so you confirm whether the expected service is really what is listening on this port.

nmap -sS -sU -p 2049 <host>

Firewall Commands

UFW
sudo ufw allow 2049/tcp
sudo ufw allow 2049/udp
iptables
sudo iptables -A INPUT -p tcp --dport 2049 -j ACCEPT
sudo iptables -A INPUT -p udp --dport 2049 -j ACCEPT

Related TCP/UDP Ports