Solved

Cannot telnet to a Linux machine using ip address

Posted on 2013-11-11
7
364 Views
Last Modified: 2013-11-13
I have tried connecting to Linux machine from my Windows machine via command line tool:

telnet xxx.xx.xx.xx

where xxx.xx.xx.xx is Linux machine's ip address

The error I get is:

Connecting To xxx.xx.xx.xx...Could not open connection to the host, on port 23:
Connect failed

What do I do?
0
Comment
Question by:YZlat
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 21

Expert Comment

by:Mazdajai
ID: 39639001
Is port 23 listening on the Linux machine? Is there firewall running on it?

netstat -ant

Open in new window

0
 
LVL 35

Author Comment

by:YZlat
ID: 39639060
I got a large list when ran netstat -ant
0
 
LVL 21

Expert Comment

by:Mazdajai
ID: 39639073
netstat -ant |grep 23

Open in new window

0
Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

 
LVL 40

Expert Comment

by:omarfarid
ID: 39639256
telnet is usually disabled. Try to use ssh rather, which is secure.

please see commands related to linux in the link below for enabling telnet.
0
 
LVL 40

Expert Comment

by:omarfarid
ID: 39639260
0
 
LVL 37

Accepted Solution

by:
Mahesh earned 250 total points
ID: 39639272
Always use Putty tool to connect linux box
Telnet protocol is working on port no. 23
0
 
LVL 10

Expert Comment

by:tmoore1962
ID: 39639412
I agree use putty but try ssh instead of telnet. See if that works.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

rdate is a Linux command and the network time protocol for immediate date and time setup from another machine. The clocks are synchronized by entering rdate with the -s switch (command without switch just checks the time but does not set anything). …
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question