Solved

Secure Telnet

Posted on 1997-11-03
2
203 Views
Last Modified: 2010-03-18
I need to set up a secure telnet between two linux machines.  I also need to deny all access to these machines to ip addresses other than those I wish to nominate. How should I do this?
0
Comment
Question by:mie
2 Comments
 
LVL 4

Accepted Solution

by:
unicorntech earned 200 total points
ID: 1586790
OK here goes..

Firstly go to http://www.cs.hut.fi/ssh/ and download the package in the tar gzipped format. Then install it as per the instructions. Read the readme this and it should explain all you need to know. However a quick rundown would be that ssh stands for secure shell and is basically an encrypted telnet session.
To deny access for telnet to your boxes do a man on tcpd. Also man on hosts_access and this willdescribe how to setup your linux box for tcpd to deny access to certain ips or to allow access to certain ips.

Hope this helps....
0
 

Author Comment

by:mie
ID: 1586791
I will look all this up. Thanks for the prompt reply. Is there somewhere I can e-mail you?
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question