1. Introduction The telnet command is used to log in to a remote host. It is a remote login program based on the Telnet protocol and is used to manage the remote host. Because telnet uses plain text to transmit messages, its security is poor. Therefore, many Linux servers do not provide telnet services and use the more secure ssh method instead. But there are still many other systems that may use telnet to provide remote login, so it is still necessary to figure out how to use the telnet client. The telnet command can also be used for other purposes, such as determining whether a port on a remote server is accessible. In addition, the Telnet protocol is a member of the TCP/IP protocol family and a standard protocol for Internet remote login services. It is an application layer protocol and is used to implement remote login based on the TCP protocol. 2. Command format netstat [-8EFKLacdfrx] [-X authtype] [-b hostalias] [-e escapechar] [-k realm] [-l user] [-n tracefile] [host [port]] 3. Option Description -8: Allows the use of 8-bit character data, including input and output -a: Attempts to automatically log in to the remote system; -b <hostalias>: Use an alias to specify the name of the remote host -c: Do not read the .telnetrc file in the user's dedicated directory -d: Start debugging mode -e <escapechar>: Set the escape character -E: Filter escape characters -f: The effect of this parameter is the same as specifying the "-F" parameter -F: When using Kerberos V5 authentication, adding this parameter can upload the authentication data of the local host to the remote host -k <realm>: When using Kerberos authentication, adding this parameter allows the remote host to use the specified domain name instead of the domain name of the host to obtain the ticket -K: Do not automatically log in to the remote host -l <user>: Specify the user name to log in to the remote host -L: Allow the output of 8-bit character data -n <tracefile>: Specify a file to record related information -r: Use a user interface similar to the rlogin command -x: Assuming the host has support for data encryption, use it -X <atype>: Turn off the specified authentication type. 4. Common Examples (1) Log in to the host. telnet 192.168.0.5 (2) Confirm whether a port on the remote server is available. For example, check whether port 22 of the remote server's ssh service is open. $ telnet 10.234.178.144 22 Trying 10.234.178.144... Connected to 10.234.178.144. Escape character is '^]'. SSH-2.0-OpenSSH_6.0 5. Common commands of Telnet client auth <argument> [...]: View and manage telnet login authentication methods. The possible values for argument are: disable, enable and status close: Close the current Telnet connection display: Use the display command to view the current settings of the Telnet client logout: Similar to the cloase command, used to close the Telnet connection or suspend it. Note: The Telnet server may not support open <host> [-l user] [[-] port]: Establish a Telnet connection to the specified host send <arguments>: Use the send command to send a specific string to the Telnet server. Support includes but is not limited to the following command strings: abort: terminate service command ao: Abort Output, abandon output command ayt: Are you there command brk: Break command eof: send End Of File character escape: send the current escape character, initially the grouping character ^]. ip: interrupt process command synch: execute Telnet synchronization operation. quit: Exit the Telnet client. status: Displays the current Telnet connection status The above is the detailed content of the use of Linux telnet command. For more information about Linux telnet command, please pay attention to other related articles on 123WORDPRESS.COM! You may also be interested in:
|
<<: Let's talk about the characteristics and isolation levels of MySQL transactions
>>: How does Zabbix monitor and obtain network device data through ssh?
This article shares the specific code for impleme...
Preface <br />In the previous article "...
A dynamic clock demo based on Canvas is provided ...
Table of contents 1 Introduction 2 Basic usage 2....
Today I suddenly thought of reviewing the producti...
1 QPS calculation (number of queries per second) ...
Preface JSON is a lightweight data exchange forma...
CSS3 syntax: (1rem = 100px for a 750px design) @m...
Variables defined in SASS, the value set later wi...
We don't need to elaborate too much on the ad...
mysql correctly cleans up binlog logs Preface: Th...
For work needs, I found a lot of information on t...
The code looks like this: <!DOCTYPE html> &...
This article example shares the specific code of ...
I want to make a docker for cron scheduled tasks ...