I am new to this forum, and have a qury regarding port number. I am using a cisco router(don't know model number) at our workplace and need to know the port number that is used by telnet application. I am getting error that Telnet can't make session as port:23 is not there...but when I checked NETSTAT, I didn't get any port number like 23. Infact, I amnot sure that port 23 is at all in use.
Could anyone can help me checking which port is being used by Telnet as default, and how can we check that ??
The telnet port is tcp/23. There is no netstat application on IOS, but if you have "transport input all" or "transport input telnet" under your line vty configuration, the device is listening on tcp/23. There could be an access-list blocking telnet still, however.
On your client, unless it has a telnet daemon running, you will not see tcp/23 in use in netstat. The telnet client on your machine will open a socket to tcp/23 on the IOS device, but use a high (ephemeral) TCP port on the client. Netstat will show this socket as being established with the remote end using tcp/23, and the local end using this high TCP port.
But I am novice with these technical jargons and can't get much out of it. I googled this in the meantime, and get that port:23 is default for telnet application. But I think that port :23 should not be affected by the router at all...right. Can firewall bethe issue for this , as I am using an internal firewall over the PC ?
Could you please suggest me how can one open or close any port over a PC? What is the actual process for thsi ?
Modern versions of Windows ship with a firewall. If you enable this, and add a rule to block tcp/23, then that will block the port. I don't use Windows, so I don't have the exact process for this.
However, from a Windows machine, if you telnet to an IOS device, that will attempt to open a socket to port 23 on the IOS device. If that fails, then the IOS device is either filtering tcp/23, or has an access-list configured on it, blocking telnet on the VTY lines. You would see this in the IOS config as an access-class configured under the line vty section towards the bottom of the config.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...