<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: python telnet client response how to decode it in Controllers</title>
    <link>https://community.cisco.com/t5/controllers/python-telnet-client-response-how-to-decode-it/m-p/5067238#M3306</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1664619"&gt;@globantt&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try to use netmiko&lt;/P&gt;</description>
    <pubDate>Fri, 12 Apr 2024 12:38:02 GMT</pubDate>
    <dc:creator>Ruben Cocheno</dc:creator>
    <dc:date>2024-04-12T12:38:02Z</dc:date>
    <item>
      <title>python telnet client response how to decode it</title>
      <link>https://community.cisco.com/t5/controllers/python-telnet-client-response-how-to-decode-it/m-p/5067002#M3303</link>
      <description>&lt;P&gt;&amp;nbsp;python telnet client response how to decode it&amp;nbsp; I think it is a specific response as all cisco servers have the same response . What is the name of this text and how do I decrypt it '\xff\xfb\x01\xff\xfb\x03\xff\xfd\x18\xff\xfd\x1f'&amp;nbsp;&amp;nbsp; import socket import sys HOST = 'xxx.xxx.xxx.xxx' # this is my cisco server ip PORT = 23 import socket import gzip s = socket.socket() #Connecting using telnet s.connect((HOST,23)) a = s.recv(10000) print(str(a)) #'\xff\xfb\x01\xff\xfb\x03\xff\xfd\x18\xff\xfd\x1f'&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/controllers/python-telnet-client-response-how-to-decode-it/m-p/5067002#M3303</guid>
      <dc:creator>globantt</dc:creator>
      <dc:date>2024-04-12T08:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: python telnet client response how to decode it</title>
      <link>https://community.cisco.com/t5/controllers/python-telnet-client-response-how-to-decode-it/m-p/5067075#M3304</link>
      <description>&lt;P data-sourcepos="5:1-5:275"&gt;It's a series of bytes that tell the client and server what features they want to enable for the connection.&lt;/P&gt;
&lt;P data-sourcepos="7:1-7:23"&gt;Decoding the Bytes:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-sourcepos="9:1-9:60"&gt;&lt;STRONG&gt;&lt;CODE&gt;\xff&lt;/CODE&gt;&lt;/STRONG&gt;: This byte marks the start of a Telnet command.&lt;/LI&gt;
&lt;LI data-sourcepos="10:1-10:105"&gt;&lt;STRONG&gt;&lt;CODE&gt;\xfb&lt;/CODE&gt;&lt;/STRONG&gt;: This byte indicates the "WILL" option, meaning the server is proposing to enable a feature.&lt;/LI&gt;
&lt;LI data-sourcepos="11:1-11:133"&gt;&lt;STRONG&gt;&lt;CODE&gt;\x01&lt;/CODE&gt;&lt;/STRONG&gt;: This byte signifies the Echo option. With Echo enabled, the server will send back whatever it receives from the client.&lt;/LI&gt;
&lt;LI data-sourcepos="12:1-12:197"&gt;&lt;STRONG&gt;&lt;CODE&gt;\x03&lt;/CODE&gt;&lt;/STRONG&gt;: This byte represents the Suppress Go Ahead (SGA) option. When enabled, the server won't send a "Go Ahead" character (usually a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;CR&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;\r&lt;/CODE&gt;) after receiving a command from the client.&lt;/LI&gt;
&lt;LI data-sourcepos="13:1-13:113"&gt;&lt;STRONG&gt;&lt;CODE&gt;\xfd&lt;/CODE&gt;&lt;/STRONG&gt;: This byte marks the start of a Telnet subnegotiation (used for options with additional parameters).&lt;/LI&gt;
&lt;LI data-sourcepos="14:1-14:80"&gt;&lt;STRONG&gt;&lt;CODE&gt;\x18&lt;/CODE&gt;&lt;/STRONG&gt;: This byte specifies the Echo character (typically a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;CR&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;\r&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI data-sourcepos="15:1-16:0"&gt;&lt;STRONG&gt;&lt;CODE&gt;\x1f&lt;/CODE&gt;&lt;/STRONG&gt;: This byte signifies the Erase character (usually a backspace or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;BS&lt;/CODE&gt;).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="container"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-sourcepos="17:1-17:21"&gt;In simpler terms:&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-sourcepos="19:1-19:90"&gt;The server is proposing to enable Echo, meaning it will echo back what the client sends.&lt;/LI&gt;
&lt;LI data-sourcepos="20:1-20:74"&gt;The server also suggests disabling the "Go Ahead" signal after commands.&lt;/LI&gt;
&lt;LI data-sourcepos="21:1-22:0"&gt;The server defines the Echo character (carriage return) and Erase character (backspace) if these options are negotiated.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="container"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="container"&gt;Hope this helps.&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 10:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/controllers/python-telnet-client-response-how-to-decode-it/m-p/5067075#M3304</guid>
      <dc:creator>bigevilbeard</dc:creator>
      <dc:date>2024-04-12T10:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: python telnet client response how to decode it</title>
      <link>https://community.cisco.com/t5/controllers/python-telnet-client-response-how-to-decode-it/m-p/5067238#M3306</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1664619"&gt;@globantt&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try to use netmiko&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 12:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/controllers/python-telnet-client-response-how-to-decode-it/m-p/5067238#M3306</guid>
      <dc:creator>Ruben Cocheno</dc:creator>
      <dc:date>2024-04-12T12:38:02Z</dc:date>
    </item>
  </channel>
</rss>

