Solved

telnet timeout setting

Posted on 2008-10-28
4
2,093 Views
Last Modified: 2010-04-21
Can someone tell me if there is a setting to alter just the telnet timeout setting without affecting other kinds of logins? Like leaving SSH unnafected.

I've found the variable TMOUT, that I can set system wide, but I'm afraid it will affect the entire system and start to knock down the ssh users.

Thanks in advance!
0
Comment
Question by:cafasdon
  • 3
4 Comments
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 22824188
Hi,
regarding TMOUT you are right. This variable is used to set the shell timeout. After a TMOUT (seconds) period of inactivity, the shell will time out (after having issued a warning nn seconds before).
Regarding telnet, I'll do some research, but I don't think we can change the timeout.
wmp
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 22824385
Hi again,
have a look at 'idled.

A description is here:
http://www.itworld.com/nls_unix_login2

Download e.g. here:
http://archive.debian.net/de/slink/idled

Good luck!
wmp



0
 

Author Closing Comment

by:cafasdon
ID: 31510844
Thanks pal! Idled worked great for me and did just what I needed! Thanks a lot!
0
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 22826980
You're welcome.
Have fun and success!
Norbert
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question