What is a telnet client in windows 7. Telnet port - what is it? Connecting and starting Telnet

Telnet can be used as a command in the Windows operating system. In fact, it is not only an executable service, but also a network protocol or even firmware that, using a text field, allows the user to “communicate” with remote computer, sending the system a command to perform a particular action, as well as receiving a log of its execution.

The name of the protocol stands for Terminal network, which literally means terminal network.

What is Terminal network

Using the telnet command, despite its low functionality, you can perform quite a lot of tasks, such as:

  • checking the connection to the server using an open port;
  • connection to remote devices (modem, router or switch) to send a command (reboot, shutdown or receive logs);
  • updating the firmware of network equipment or mobile phone;
  • file transfer.

Many people believe that such a connection works, like most network services, on a client-server principle. However, it is not. telnet is a completely two-way service with the same functionality and access levels.

Interestingly, the program itself includes a minimal set of functions, which contains only a connection option and an authentication process (verifying the authenticity of the username and password that is allowed access). All other options, both command and system, are called by the connected applications.

How to work with the shell?

To use the telnet command's functionality, you must use the command line. In the seventh Windows versions and above, the service is disabled by default and does not start automatically when the command is called. Therefore, you need to follow these steps to enable telnet:


How to manage the service?

Once you enter the Windows Terminal Management service, you need to know a few commands to be able to manage it. There are the following options for obtaining a list of control keys:


If you are familiar with the options, you can immediately connect to the desired resource with the required data. In this case, the server for the connection is “smatp.ya.ru” and the port is “25”.

Result:

The telnet command is very easy to use and quite convenient. However, the technology of its operation does not provide for safety at all. The shell runs under Windows in a completely unprotected mode and without encryption. Therefore, instead of this function, ssh has been used for quite some time.

According to the principle of organizing the connection, they are almost the same. But the ssh protocol was developed taking into account possible security technologies. In some cases more simple way the connection is quite sufficient, for example, when you need to connect to the equipment to load new firmware into it or restore the old one, as well as to change the system configuration.

If you use several protocols to connect at once, then it is faster, more convenient and safer to do this through a special program, for example “Putty”.

Not all computer users are aware of the presence of hidden services that allow you to perform various operations without using special software. In operating rooms Windows systems and Linux there is a Telnet service. This material will discuss in detail the purpose of the service, commands, capabilities and how to work with it correctly.

What is Telnet

Telnet is a means of communication that is established between terminal devices. An example of such a connection is quite simple: a personal computer and a server that supports a similar type of connection. Telnet is not any software, it is communication protocol. But it should be noted that there are some utilities that work via the “terminalnetwork” protocol.

In the recent past, Telnet was one of the main ways to connect to the network. Now the utility practically not used. Today, operating systems have more advanced protocols installed, eliminating any additional actions from the user.

This communication protocol is used in some operations:

  • connection to a remote desktop;
  • examination ports for connectivity;
  • usage software that is only available on remote machines;
  • application system directories, which can only be opened using this type of protocol;
  • sending Email without using additional software;
  • users using this protocol allows other users gain access to your personal computer.

Installation and launch

There is no need to download the utility; Telnet is built into Windows 7/8/10 by default.

Installation and startup instructions:

In order to start the client you need to open the command line:

We invite you to watch the video on installing Telnet in Windows:

Port check

Checking a network port to see if it can be accessed personal computer to Telnet:

  • in the window you need to enter the telnetip command;
  • followed by enterIP address computer, for example, 192.168.1.1. You can view the address in the settings of your network router;
  • At the end, enter the FTP port “21”. Thus the command will look like this: telnet 192.168.0.1 21;
  • after that it will appear error message if the port is unavailable or asking you to enter additional data if the port is open.

Telnet Commands

Utility commands are a way to interact with it. To display list of all commands, you must enter “help”. Next, we will look at the main commands in detail:

  • “open” - the request allows connect to a remote server;
  • "close" - process interruption connecting to a remote server;
  • "set" - setting server connection parameters;
  • "term" - the request is intended for terminal type indications;
  • "escape" - sets control character;
  • "mode" - choice operating mode;
  • "unset" - reset previously entered parameters;
  • "start" - launch servers;
  • "pause" - temporary stop server operation;
  • "continue" - continuation of work servers after a pause;
  • "stop" - complete work stoppage server.

Telnet on Linux

Like Windows, Telnet is built into the operating system. Linux system. Previously it was used as the standard Telnet protocol, now it has been replaced by the more improved SSH. As with the previous OS, the utility in Linux is used to check ports, routers, etc.

Let's look at the main operating modes:

  • « line by line». This mode work is recommended. In this case, editing the request is carried out on the local PC and is sent to the server only when it is ready;
  • « character-by-character" Every character typed in the console window is sent to the remote server. You cannot edit the text here. When you delete a character using “Backspace”, it will also be sent to the server.

Basic commands in Linux:

  • “close” — interrupt the connection;
  • “encrypt” — enable encryption;
  • “logout”—turn off the utility and close the connection;
  • “mode” — selection of operating mode;
  • “status” — connection status;
  • “send” — sending a telnet request;
  • “set” — setting server parameters;
  • “open” — connection to a remote server;
  • “display” — display of special characters.
  • in the console window enter a request for server availability checks, for example, "telnet 192.168.1.243";
  • Next, let’s check access to the port by entering the request “telnet localhost 122” and “telnet localhost 21”. A message will appear on the console screen indicating whether any of the ports are accepting the connection;
  • example of remote control using telnet. To do this, enter the request “telnet localhost 23” in the main window. "23" is the default port. To produce remote control, must be installed on local computer"telnet-server". After this, a message will appear asking you to enter your login and password.

Disadvantages of Telnet

The main disadvantage of this protocol is the remote connection without using encryption. The only security point is the authorization of users in the telnet session. But nevertheless, the login and password are also transmitted in unencrypted form, so access to them can be obtained one way or another. It is strongly recommended not to transmit any important data over local networks.

Few computer users today know about the existence of various special protocols on the computer that allow them to perform various actions without using a graphical interface or third-party programs. Therefore, the desire to learn how to use the TELNET service immediately arises when they learn about the corresponding protocol.

Next, we will outline a little theory about what TELNET is, what many people strive to master it for: the capabilities of the service, as well as a list of basic commands that allow these capabilities to be implemented on Windows.

TELNET is a communication tool that establishes a transport connection between terminal devices, clients, that is, your computer and someone else’s machine, a server that supports this connection standard. This is not a special program, but just a network protocol, but the word TELNET (terminal network) also refers to various utilities that also use this protocol. Today Telnet is present almost everywhere, all operating systems, one way or another, use it, in

TELNET implements a text interface, which differs from the graphical interface familiar to the average user in that all commands must be entered manually.

What does all this give us?

Previously, this service was one of the few ways to connect to the network, but over time it has lost its relevance. Today there is much more convenient programs, which do all the work for the user and do not force him to memorize various commands in order to perform the simplest actions. However, some things can still be done using Telnet.

Network connections

With Telnet you can:

  • connect to remote computers;
  • check the port for access;
  • use applications that are only available on remote machines;
  • use various directories that can only be accessed in this way;
  • send emails without use special programs(clients);
  • understand the essence of the work of many protocols used today, and derive certain benefits from this;
  • provide other users with access to data located on their computer.

Let's start using it

Launch

Launching TELNET on Windows 7 and any other Windows is quite simple. To do this, you first need a client, if it is not already installed:

  • Go to the Control Panel.

  • Select “Programs”.
  • Select the “Turn Windows features on or off” tab.

  • Find the Telnet client and put a marker next to it if it is not already installed.

Then click “OK” and wait a minute while the client is installed.

The terminal is launched in Windows via the command line, if you do not have any special utilities installed for working with Telnet. But since you are reading this article, it means that you are just beginning to get acquainted with this topic, and first it would be nice to master the basics of control using command line.

  1. Launch the command line as administrator.
  2. Enter "telnet".

The command line will reboot, and the TELNET command line will now open, in which we will work.

Checking the port

One of the simplest actions performed in TELNET is port checking. You can check the port to see if it can be accessed from your computer. To do this you need to do the following:

In the command line opened using the method above, enter: telnetip address port number

For example, if your IP address is 192.168.0.1 and the port number is 21 (FTP port), then enter:

telnet 192.168.0.1 21

If the command produces an error message, it means the port is unavailable. If a blank window appears or a request to enter additional data, then the port is open. For Windows, this method of checking the port can be quite convenient.

Teams

TELNET commands are the basis for using the terminal. With their help, you can control a computer that uses this protocol, if access is allowed for you, as well as perform various other actions. As mentioned above, on Windows they are entered in the command line of the Telnet application.

To see the main list of commands, enter in the line help and press "Enter". Basic commands:

  1. Open- connection to a remote server. You must enter this command along with the managed server name and port number, for example: openredmond 44. If the parameters are not specified, then they are used local server and default port.
  2. Close- disconnect from a remote server. Similar parameters are used.
  3. Set- setting up a remote server, used with the name of the managed server. Together with Set The following commands are used:
    1. - used to specify a terminal of the specified type.
    2. - sets the control character.
    3. - sets the operating mode.
  4. Unset [option]- disables a previously specified parameter.
  5. Start- starts the Telnet server.
  6. Pause- pauses the server.
  7. Continue- resumes work.
  8. Stop- stops the server.

TELNET is one of the oldest protocols, but it is still used today. This means that you can start using it for your own purposes. To do this, you just need to learn the syntax and list of commands and start practicing. You can learn a lot of new things, and at the same time begin to look at the Internet and your previously familiar online activities in a completely different way.

Progress is a phenomenon that knows no stops. In area information technologies changes occur every day: new products appear, outdated services become a thing of the past. But there are tools that are still popular despite the emergence of an alternative. A prime example is the Telnet protocol. What is Telnet and how to use it?

A little history: when and why did Telnet appear?

Telnet appeared more than 40 years ago, shortly after the installation of the first ARPANET server. This is one of the oldest protocols on the Internet. In an era when there was no trace of it, but the first networks had already appeared, the need for remote connection to devices dictated its requirements. The first solution to the problem that appeared, like all subsequent ones, allowed you to work on a remote device as if it were your own. All supported functionality has become available in the interface. You just need to get the required access level and know the Telnet commands. We figured out what this protocol is and why we need it. But how is Telnet connection implemented today?

Launch the terminal. Enable required services

In modern operating systems Windows family, before starting Telnet, you need to check whether this component is installed on the system. This is not difficult to do. For Windows 7, the most common operating system today, you need to perform the following sequence of actions:

  1. Select "Control Panel" or Control Panel from the Start menu.
  2. In the window that opens, select “Programs”. In the English version of the system this will be Programs.
  3. Go to the “Turn Windows features on or off” tab. The system generates a list of all available components. Already installed ones will be marked with checkboxes. This process may take several minutes.
  4. After the list is loaded, you need to find the Telnet client item. There is also a Telnet server in the menu, but we will return to this a little later. If there is no checkmark next to the item we need, it needs to be checked.
  5. After clicking the "OK" button, the system will begin to install the necessary components for the correct operation of the protocol. This may take some time, but modern computers the process is unlikely to take more than a minute. Thus, the question of how to enable Telnet was resolved in 5 simple steps.

Telnet service: and Telnet client?

Both concepts from the title have already been mentioned a little higher. Like many other applications, Telnet has a client side and a server side. However, a Telnet server is not necessarily a server in the general sense of the word. The computer from which the connection is made is considered to be a client, the device to which the connection is made this connection, will be the server. This could be a router, a computer, or any other host that supports command line control. If we are talking about remote administration of a personal user computer or server, the Telnet port must be open. It is often closed for security reasons, so when you try to establish a session, an error message will appear. To check open and closed ports, you can use a special utility or web service. The standard Telnet port is 23. If you want to not only connect to other computers yourself, but also allow administration of your PC via Telnet, then in the same operating system snap-in you need to check the box next to the Telnet server component. The PCs and server hardware that you administer should be configured in the same way.

Programs for working with Telnet

After starting all the necessary Telnet services, you can safely start working using the built-in Windows tool- command line. It is called up from the Start menu, either by clicking on the corresponding item, or by speed dialing (cmd). It is advisable to always run the command line with “Administrator” user rights (either local, the device on which you are working, or domain). This way, you won't have to restart the application if elevation is required. In addition to the available tool of the operating system itself, there are also third party programs, allowing access via the Telnet protocol. The most popular of them is Putty. Along with it, other applications running under different operating systems, such as TeraTerm, AnyConnect, DTelnet, EasyTerm, KoalaTerm and many others. Which program to use, everyone decides for themselves, depending on personal preferences, interface requirements, etc. There are no significant differences in terms of functionality between them, and there cannot be. Each utility implements the entire available list of Telnet commands.

Telnet commands: how to figure it out?

For an experienced user, it will not be difficult to install the necessary components in a matter of minutes (if they have not been installed previously), open a Telnet session and perform all the configuration of the remote host. However, there are also newcomers who see the console almost for the first time in their lives. How to find out the list of available commands in Telnet? What is WONT AUTH or SET LOCALECHO? Everything is not as difficult as it seems at first. First, you should always remember that any command interface has built-in help. It can be accessed using standard keys, for example, help or “?”. Secondly, given how old the Internet is, you can find an endless number of resources with useful information by syntax. Thus, there is absolutely nothing to worry about. And practice shows that using several lines of commands the result is much easier to achieve in most cases. And after just a few sessions, you will confidently type the necessary commands without resorting to the syntax assistant.

Telnet on network devices

We have already said that using the Telnet protocol you can manage not only computers, but also a wide variety of network devices. The most common class of such devices is routers. So what is Telnet in a router, what is it for, how to enable it?

Depending on the manufacturer and specific model There are different ways to enable Telnet access. You can log into the router via the web interface or through the console. In the first case, you will need to find a remote administration point where one or another type of connection is allowed (Telnet, ssh). In the second case, access can be granted via the command line. Each administrator chooses a scenario that is convenient for themselves. However, there are routers that implement only one of two possible initial connection options, for example, only a web interface is available. An administrator who is accustomed to working with the console will find it rather uncomfortable to look for the item where he needs to put the coveted checkbox, but in reality there is nothing complicated about it. The interface of most modern routers is quite clear. The names of the menu items speak for themselves; the minimalist design will not allow you to get confused.

Advantages of Telnet sessions

At this point, we've become familiar enough with the technology to talk about the pros and cons of Telnet. No matter how successful the product is, it cannot be said that it is absolutely devoid of disadvantages. And if we are talking about a service that was released at the very beginning of the 70s of the last century, you should not forget about this fact.

Of the obvious advantages, it is necessary to note the simplicity, speed and convenience of the protocol. In less than a minute, a convenient client will contact the server TCP port of your choice and create a local terminal emulation. Above we talked about the standard 23 working port. In fact, you can “listen” and “talk” via Telnet on any port. This is where the flexibility of the protocol lies.

Compared to other remote administration protocols, Telnet is less processor intensive. With the current pace of development, this plus may seem insignificant, but only at first glance. Along with the development of technology, companies producing software. Applications are becoming more and more bulky, requiring more and more space on the hard drive, more random access memory, more powerful processors. A utility that, compared to other installed software, will consume a small amount of system resources, will come in handy.

Disadvantages of the Telnet protocol

The main and often cited disadvantage of Telnet is access to remote device carried out over an unencrypted communication channel. The only barrier for an attacker is user authentication at the time of opening a Telnet session, that is, the requirement for a login and password. However, this data is also transmitted unencrypted. Therefore, if someone sets out to hack Telnet access, he only needs to briefly run a packet sniffer (software for “catching” packets). After some time, the administrator will open his Telnet session and provide the remote server with a login and password, which will be immediately intercepted by the attacker in clear text. In this context, an alternative to Telnet is SSH (secure connection). Therefore, it is not recommended to use Telnet in widely accessible networks, for example, outside your secure office LAN. In addition, you should remember that the connection to the server may be interrupted.

Conclusion. To use or not?

Of course, other methods of remote administration have emerged over more than four decades. SSH is very popular. It would seem that Telnet should have disappeared a long time ago. But it is still in demand and is still used. If you follow certain safety principles, keeping in mind that your the local network must be reliably protected from outside penetration, using Telnet will not harm your equipment. If you neglect security, neither SSH nor any other technology will save you.

Telnet is still used in areas such as connecting to databases, checking availability network devices(routers and switches), server equipment etc.