Access remote systems. telnet is the user interface that communicates with another host using the Telnet protocol. If telnet is invoked without host, it enters command mode, indicated by its prompt, telnet>, and accepts and executes commands. Type ? at the command prompt to see the available commands. If invoked with arguments, telnet performs an open command (shown in the following list) with those arguments. host indicates the host's official name, alias, or Internet address. port indicates a port number (default is the Telnet port).
The Telnet protocol is often criticized because it uses no encryption and makes it easy for snoopers to pick up user passwords. Most sites now use ssh instead.
Automatic login to the remote system.
Use bind to bind the local socket to an aliased address or the address of an interface other than the one that would be chosen by connect.
Disable reading of the user's .telnetrc file.
Turn on socket-level debugging.
Set initial telnet escape character to escape_char. If escape_char is omitted, no escape character is predefined.
With Kerberos V5 authentication, allow forwarding of the local credentials to the remote system.
With Kerberos authentication, obtain tickets for the remote host in realm, instead of in the remote host's realm.
When connecting to remote system and if remote system understands ENVIRON, send user to the remote system as the value for variable USER. Implies the -a option.
Open tracefile for recording the trace information.
Emulate rlogin. The default escape character for this mode is a tilde (~); an escape character followed by a dot causes telnet to disconnect from the remote host; a ^Z instead of a dot suspends telnet; and a ^] (the default telnet escape character) generates a normal telnet prompt. These codes are accepted only at the beginning of a line.
Turn on data-stream encryption if possible.
Request 8-bit operation.
Disable the escape character functionality.
With Kerberos V5 authentication, allow local credentials to be forwarded to the remote system, including any that were already forwarded to the local environment.
Do not allow automatic login to the remote system.