Solved

SSH and Telnet

Posted on 2014-03-26
4
400 Views
Last Modified: 2014-03-26
Is SSH used for anything other than secure telnet

Is it used for any firewall, security, other issues
0
Comment
Question by:Anthony Lucia
  • 2
4 Comments
 
LVL 3

Assisted Solution

by:mlsbraves
mlsbraves earned 167 total points
ID: 39957222
SSH and Telnet serve the same purpose. SSH is a different protocol than telnet so it is not just a secure version on telnet.

Telnet is an unsecured communication while SSH uses encryption to secure the communication.

Most firewalls, switches, and other network devices support both telnet and ssh. Some older devices only support telnet.

You can use a program called Putty for all your telnet,ssh, and COM needs:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 166 total points
ID: 39957263
SSH also supports additional functionality, such as SCP and port forwarding, in addition to strong authentication.

See http://en.wikipedia.org/wiki/Secure_Shell

SSH is a protocol that can be used for many applications across many platforms including most Unix variants (Linux, the BSDs including Apple's OS X, & Solaris), as well as Microsoft Windows. Some of the applications below may require features that are only available or compatible with specific SSH clients or servers. For example, using the SSH protocol to implement a VPN is possible, but presently only with the OpenSSH server and client implementation.

    For login to a shell on a remote host (replacing Telnet and rlogin)
    For executing a single command on a remote host (replacing rsh)
    Secure file transfer
    In combination with rsync to back up, copy and mirror files efficiently and securely
    For forwarding or tunneling a port (not to be confused with a VPN, which routes packets between different networks, or bridges two broadcast domains into one).
    For using as a full-fledged encrypted VPN. Note that only OpenSSH server and client supports this feature.
    For forwarding X from a remote host (possible through multiple intermediate hosts)
    For browsing the web through an encrypted proxy connection with SSH clients that support the SOCKS protocol.
    For securely mounting a directory on a remote server as a filesystem on a local computer using SSHFS.
    For automated remote monitoring and management of servers through one or more of the mechanisms discussed above.
    For development on a mobile or embedded device that supports SSH.

File transfer protocols using SSH

There are multiple mechanisms for transferring files using the Secure Shell protocols.

    Secure copy (SCP), which evolved from RCP protocol over SSH
    rsync, intended to be more efficient than SCP
    SSH File Transfer Protocol (SFTP), a secure alternative to FTP (not to be confused with FTP over SSH)
    Files transferred over shell protocol (a.k.a. FISH), released in 1998, which evolved from Unix shell commands over SSH
0
 
LVL 3

Expert Comment

by:mlsbraves
ID: 39957268
One other benefit of using SSH/SCP is being able to securely send/receive files.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 167 total points
ID: 39957314
I usually use the WinSCP client (e.g. [url="http://winscp.net/eng/download.php" WinSCP[/url] to SSH in with a GUI, then switch to PuTTY from inside that (using Commands -> Open in PuTTY on the menu, which passes the logon credentials to it) if I need a terminal.WinSCP and PuTTY on port 22 (click for larger)
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now