Strange Networking problem

Posted on 2002-06-05
Last Modified: 2010-08-05
I am using a linux box as a server on my network having win95/98 nodes. Services in use are smb file server (with domain logon), web server, mail server, squid proxy server, dhcp server. Telnet also works fine here.

Every thing works fine here. Now i want to shift this Linux box to another similar setup.

After shifting, I am able to log on to smb file server, use the dhcpd server without any problem. But the web server, mailserver and squid proxy services are not available.

I am able to ping but I am not able to telnet. Can some one help me out. This is not an isolated problem but none of the machines in the new setup are able to able to use the proxy or mail.
Question by:kathotia

Expert Comment

ID: 7056617
This may be an address resolution problem. Check if the machine you are telnetting from can be resolved to its DNS name. Some services on Linux do not accept conections if it cannot resolve the IP address trying to connect to its name. You can add those IP addresses to your hosts file.

You can check /var/log/messages on your Linux machine for these errors.
LVL 15

Accepted Solution

samri earned 200 total points
ID: 7072320

What Linux distribution that you are using; RedHat ??, Debian, etc. etc.  And during the installation of the OS (Linux), did you went thru the firewall setup and configure the ports for web, mail, and squid.

One possibility to test, is to try on the Linux box itself, and try to establist connection to "".

TO enable such services, you need to run the firewall-config, and allow such ports;  By default smtp - 25/TCP, POP - 110/TCP, web - 80/TCP, squid - 3128 - TCP, telnet - 21/TCP.

And I would assume that FTP is also not working.

please feedback.
LVL 15

Expert Comment

ID: 7072362

thank's for the "C" :)

I would be more interested to know whether any of the "hints" actually true; Before any of us could proceed further to help you solve the problem.  Rather proposing a complete solution that is totally "off" the track.


What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.


Expert Comment

ID: 7073522
As Admin here, I do not see anything wrong that would require under the stadards that is the result of a C grade, therefore I shall change it, especially when the grade given probably was not tried at the time of acceptance.

CS Admin @ EE

Author Comment

ID: 7074790

your comments hepled me to solve my problem. 'C' was given because the comment was not actually the solution, but it only helped me locate the problems and solve it, actually the service xinetd was switched off due to some unforseen reasons. after reading your comments i discovered the fault and rectified it. hence the grade 'c'
LVL 15

Expert Comment

ID: 7096496

Hmm... anyhow, at least post something for "PAQ" lurkers out there. At least we all could have benefit from your findings.

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now