> >> Can you telnet to the VNC port on the server? > > How I do it? > > I'm not sure telnet is the way to go because if memory serves it isn't > installed by default. The best way to check is to use a port scanner to > see the status of the port on the target system. The tool I use is > called "nmap". If you are using a Windows machine to vnc into the > target system, you can download nmap from here: > > http://nmap.org/download.html > > If you are using Fedora to vnc to the target, then you can see if nmap > is installed by running this as root from the command prompt: > > yum info nmap > > If it isn't installed, you can install it by using the following command: > > yum install nmap > > Once it is installed, you can run the following command on the source > system to see if the target system has the port open: > > nmap -v -n -P0 -p5900-5910 192.168.1.10 > > Just substitute the IP address of your target system for the address > "192.168.1.10" in the example above. A result of "closed" means the > port is being actively blocked and a message is being sent to tell you > that it is. A result of "filtered" means that the port is not > responding to say whether it is open or not. Once a result of "open" > means that you can access the service listening on the port. > > I gave a range of 5900-5910 in the example above because you can > configure the vnc service to listen on a number of different ports. That > what the ":1" or ":2" mean when you set up the entries in the > /etc/sysconfig/vncserver file. This also means that to connect to a vnc > server set up for ":2" on the example IP address above you need to use > "192.168.1.10:2" in the vncviewer and the nmap output from probing the > target system should show that port 5902 is open. Starting Nmap 6.01 ( http://nmap.org ) at 2014-02-26 22:47 CET Initiating SYN Stealth Scan at 22:47 Scanning 193.49.194.19 [4 ports] Completed SYN Stealth Scan at 22:47, 3.01s elapsed (4 total ports) Nmap scan report for 193.49.194.19 Host is up. PORT STATE SERVICE 5900/tcp filtered vnc 5901/tcp filtered vnc-1 5902/tcp filtered vnc-2 5903/tcp filtered vnc-3 Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 3.08 seconds Raw packets sent: 8 (352B) | Rcvd: 11 (764B) =========================================================================== Patrick DUPRÉ | | email: pdupre@xxxxxxx Laboratoire de Physico-Chimie de l'Atmosphère | | Université du Littoral-Côte d'Opale | | Tel. (33)-(0)3 28 23 76 12 | | Fax: 03 28 65 82 44 189A, avenue Maurice Schumann | | 59140 Dunkerque, France =========================================================================== -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org