what is telnet,ssh??
what is the perpose of this?
wer r this configured and how to configured??
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
do you know shridh i used telnet process to hack another
network.but don't do that becoz u r a employ and i am a fresher.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / jitendera sinha
telnet-telnet is a process by which you can configure
router/switch having any physical connection by any means.
let understand it with a example
supose you are working in such comany that have one barnch
in bangalore and 2nd in punee.now you are workin in bangalore
after some time network of pune have some prob.the employ
have coneected you to solve it.then what do you do u donot
go the pune becoz it take time so telnet help you
by the telnet you can troublshoot the network of pune by
seating in the bangalore
so i can say that by telnet u can access the remote network
this is tellnet.
SSH allows users to log into host systems remotely. Unlike
rlogin or telnet SSH encrypts the login session, making it
impossible for intruders to collect clear-text passwords.
SSH is designed to replace older, less secure terminal
applications used to log into remote systems, such as telnet
or rsh. A related program called scp replaces older programs
designed to copy files between hosts, such as ftp or rcp.
Because these older applications do not encrypt passwords
between the client and the server, you should avoid them
whenever possible. Using secure methods to remotely log into
other systems will decrease the security risks for both your
system and the system you are logging into.
Features of SSH
SSH (or Secure SHell) is a protocol for creating a secure
connection between two systems using a client server
architecture. Under the SSH protocol, the client machine
initiates all connections to a server.
The SSH protocol provides the following safeguards:
*
After an initial connection, the client verifies it is
connecting to the same server during subsequent sessions.
*
The client transmits its authentication information to
the server, such as a username and password, in an encrypted
format.
*
All data sent and received during the connection is
transferred using strong, 128 bit encryption, making
intercepted transmissions extremely difficult to decrypt and
read.
*
The client has the ability to use X11 [1] applications
launched from the shell prompt. This technique, called X11
forwarding, provides a secure means to use graphical
applications over a network.
now how to configured the telnet and how to use it
go to router(config)#line vty 0 4
router(config-line)#login
router(config-line)#password *****
now how to use telnet
step 1 go to cmd mode
step 2 type telnet
microsft telnet> type here open
to (type default gateway ip address of router)
after that
another window open
login name:type the login name
password:
after entering the password
you are able to telnet process
NOTE-telnet is also known as remote access
thanks
by jitendera sinha.i did done some spelling and
grammatically mistake plz forgave me.it was a long question
and it is possible that there is lots of speel mistake
Is This Answer Correct ? | 1 Yes | 0 No |
Can you describe the Authentication Header (AH) Protocol?
What does CCNA stand for? A. Cisco Certified Network Administrator B. Cisco Certified Network Associate C. Certified Circuitry in Networking Apprentice D. Calico Cats of North America
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy
As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see "Set DF bit in IP header? [yes] :" What would happen if you answered no at the prompt. A. This lets the router fragment the packet. B. It tells the router not to fragment the packet. C. This lets the router direct the packet to the destination it finds in its routing table. D. It tell the router to send the packet to the next hop router.
Hi Guys.. I hv a confusion in my mind. Plz help me to clear my concept. How a port respond when a PortFast port receives any BPDU. Please make sure that BPDU Guard, ROOT Guard are not considered in this scenario. Just a spanning tree without any enhancement. Will the port goes through STP port state??? As we knw that PortFast bypass the Listening & Learning State? How it will respond when a BPDU (Inferior or Superior) is received on that Port. Thanks in advance. Waiting for Replay.
HI friends. i need a suggestion and looking towards you foryours valuable suggestion friends i have completed ccna now i want to done red het linux system admnistration and networking i am liitle bit confuse betwwen them which one is better for me for job point of view reply soon waiting for your reply
What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEGA D. 00.00.12.34.FE.AA
I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a small to medium business or ISP but I am trying to get the last lab putting it all together. Does anyone have anything for this. I know it is ahead of me but I would like to get this so I can look at the beginning and understand it more
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Which of the following is a routing protocols? TCP RIP SMTP UDP
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport
What is the difference between csma/cd and csma/ca?