Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I was trying to access to a specified port of remote machine from my CENTOS machine and i am not able to connect.
If i write telnet remote_machine 666 i have no response.
The client machine is a vmware virtual machine where where the firewalld and iptables are stopped.
In the same vmware server i have another virtual machine (this one in ubuntu), that is able to connect to 666 port of remote machine.
Another curious things are that:
With a nmap, from ubuntu machine i can see remote 666 port as open, while from CENTOS machine 666 port is filtered.
In vmware client i can see ubuntu network adapter type(where it works) is defined as flexible while CENTOS one is defined as VMXNET 3
What could happen?
On the client machine what does "lsof -i :666" show?
I'm thinking that 666 is LISTENing only on localhost and/or some bridge interface accessible to other VMs on same hypervisor but not to machines not on the same hypervisor.
You might want to use netcat (nc) rather than telnet for testing. A lot of distros these days aren't installing the telnet command (not to be confused with the telnet service).
nc -vw2 <remote> 666
Verbosely tries to connect to the remote you specify on port 666 and times out in 2 seconds. Running "man nc" will give you more details. You can even use nc to LISTEN on a port on one side and connect to it from another system to verify firewall settings before the app that will ultimately LISTEN on that port gets installed.
filtered/unknown basically just means it couldn't reach the port and doesn't know why.
The fact "lsof" didn't show anything LISTENing on port 666 on the server suggests the app that should be LISTENing isn't running. You could run "netstat -an |grep 666" on that same server to see. (Some things do not show up in lsof such as RPC stuff on some platforms but for the most part lsof should show things.)
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.