Solved

Telnet with public IP will not connect

Posted on 2009-05-13
6
510 Views
Last Modified: 2012-06-27
I have a Samsung iDCS phone system with Voice Mail that I can access via Telnet using the network port and the private IP I assigned it. I used a 1-to-1 NAT on my firewall and assigned it a public IP. Using this IP it will not connect.
I tested the Telnet service through the firewall using another server with the same setup and was successful.
Why can I not connect to my phone system this way?
0
Comment
Question by:GMSMRM
  • 4
  • 2
6 Comments
 
LVL 10

Expert Comment

by:lanboyo
Comment Utility
Most likely your phone system does not have a route back to the internet. Did you give it a static route?
0
 

Author Comment

by:GMSMRM
Comment Utility
It has the DNS server address.
0
 
LVL 10

Expert Comment

by:lanboyo
Comment Utility
Right. I don't know how to add routes to this device, but does it have a valid route to the internet? A default gateway? Is the dns server on your network or on the internet?
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:GMSMRM
Comment Utility
The DNS server is on the network.
0
 
LVL 10

Expert Comment

by:lanboyo
Comment Utility
What type of configuration interface do you have? is there any place to set a default gateway or add routes?
0
 
LVL 10

Accepted Solution

by:
lanboyo earned 500 total points
Comment Utility
As far as I can tell the system has no way to add a default route to it. It has the capability to add a remote VOIP network, which is essentially adding a static route, but it does not seem to have the capability to add a default route. So, most likely, your telnet connection reaches the device, but the device does not know how to get back because it does not have a default route. This seems to be a deliberate security limitation.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

We all know how boring and exhausting it is to transfer huge web projects developed locally to a webserver simply via FTP. The File Transfer Protocol is a really nice solution if you need to transfer small amounts of files, but if you're plannin…
Secure Shell (SSH) is a network protocol for secure data communication, mainly used to administer remote Unix / Linux servers via command line. But it also allows the user to open a secure tunnel between a client and a server where he can send any k…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now