Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Secure Telnet

Posted on 1997-11-03
2
204 Views
Last Modified: 2010-03-18
I need to set up a secure telnet between two linux machines.  I also need to deny all access to these machines to ip addresses other than those I wish to nominate. How should I do this?
0
Comment
Question by:mie
2 Comments
 
LVL 4

Accepted Solution

by:
unicorntech earned 200 total points
ID: 1586790
OK here goes..

Firstly go to http://www.cs.hut.fi/ssh/ and download the package in the tar gzipped format. Then install it as per the instructions. Read the readme this and it should explain all you need to know. However a quick rundown would be that ssh stands for secure shell and is basically an encrypted telnet session.
To deny access for telnet to your boxes do a man on tcpd. Also man on hosts_access and this willdescribe how to setup your linux box for tcpd to deny access to certain ips or to allow access to certain ips.

Hope this helps....
0
 

Author Comment

by:mie
ID: 1586791
I will look all this up. Thanks for the prompt reply. Is there somewhere I can e-mail you?
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
what is the size of a TCP segment 10 89
Linux DNS problems 23 466
Vmware tools installation in ubuntu 14.04 11 105
Linux TCP flaw lets 'anyone' hijack Internet traffic 9 86
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question