

$ telnet 192.168.207.130Īn acceptable user login input will be followed by a password request which when we key in should give us managerial access to the remote Linux system. We can now attempt to make a Telnet connection to a targeted/remote Linux machine. $ sudo firewall-cmd -permanent -zone=public -add-port=23/tcp If you are using or have a firewall enabled on your remote/targeted Linux machine, you will need to allow traffic through port 23 since Telnet uses it for its network communication. The above IP address belongs to the targeted machine. The implementation of the above syntax rule will look like the following: $ telnet 192.168.207.130 On the Telnet-powered server machine, we will adhere to the following syntax rule: $ telnet
#How to use telnet server install
$ sudo apt install telnetd -yĪlso, check on the status of Telnet to make sure it is running on the remote machine too. $ ifconfigĪlso, the targeted remote Linux machine should have Telnet installed on it as per the suggested installation commands discussed above. To perform an unencrypted connection to remote host systems via Telnet, we first need to identify the IP address of the machine we are targeting. $ sudo systemctl status inetdĬheck Telnet in Linux Testing Remote Linux Connections via Telnet $ sudo zypper install telnetd Ĭheck on its status to make sure it is up and running. $ sudo emerge -a net-misc/netkit-telnetd Since Telnet is unencrypted, its recommended usage is for testing purposes only and in user-defined networks. This article will walk us through the installation and usage of this ancient server administration protocol. It is worth noting that Telnet utilizes port 23 for its remote TCP connections. With Telnet, you not only get to establish successful remote connections but also troubleshoot and test the system services that define the remote computing environment.įor instance, we could check if a particular port is active/open/listening on the targeted remote system.

Telnet achieves the same functionality through TCP/IP protocol.

Remote access to other operating system environments on an active network is not just a thing of the SSH ( Secure Shell) protocol.
