Solved

lacie drive remote reboot through telnet

Posted on 2008-10-15
1
1,065 Views
Last Modified: 2008-11-15
hi
I have lacie drive that I cannot seem to connect to across a vpn
I can telnet into the firewall/router 10.11.1.1
and from that telnet session I can telnet 10.11.1.3 80 (lacie drive)
Basically when I press enter I can see things like
<HEAD><TITLE>400 Bad Request</TITLE></HEAD>
                                           <BODY><H1>400 Bad Request</H1>
                                                                         Unsuppo
rted method.
            </BODY>

[Connection to 10.11.1.3 closed by foreign host]

I seen this site
http://xbmc.org/forum/showthread.php?t=32105
which allows you to a remote shutdown, through typing a url to remotley shut it down,
but I dont know how to do this through telnet or even if might work through telnet, its a bit of long shot, any help with but really appreciated.
0
Comment
Question by:Dan560
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 57

Accepted Solution

by:
giltjr earned 500 total points
ID: 22730053
Port 80 is generally/normally used for HTTP, not telnet.  Although you are using telnet on your side the other side is a web server and expecting HTTP commands.  I know how to type HTTP commands using a telnet client, but I don't know how to pass the userid and password for authentication.

What I think you need to do is setup the firewall so that you can http directly to the lacie box and then use a normal web browser to do this.
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Suggested Courses

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question