Telnet is a protocol that allows remote access and management of devices through unencrypted communication over TCP port 23, while SSH provides encrypted remote access and management over TCP port 22, securing data from eavesdropping. Both require a client on the accessing device and server on the remote device. While Telnet is not recommended for production systems due to lack of encryption, SSH provides the same functionality as Telnet but with an encrypted communication link for more secure remote access and administration.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
139 views
Telnet - SSH
Telnet is a protocol that allows remote access and management of devices through unencrypted communication over TCP port 23, while SSH provides encrypted remote access and management over TCP port 22, securing data from eavesdropping. Both require a client on the accessing device and server on the remote device. While Telnet is not recommended for production systems due to lack of encryption, SSH provides the same functionality as Telnet but with an encrypted communication link for more secure remote access and administration.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6
TELNET & SSH
SYKES Eduardo Cano Telnet
• Telnet is a network protocol that allows a user to
communicate with a remote device. It is a virtual terminal protocol used mostly by network administrators to remotely access and manage devices. Administrator can access the device by telnetting to the IP address or hostname of a remote device. • To use telnet, you must have a software (Telnet client) installed on a remote device, a Telnet server must be installed and running. Telnet uses the TCP port 23 by default. Telnet • Telnet – Telecomunication Network – Login to devices remotely – Console Access – Unencrypted communication – Not the best choice for production system SSH – Secure Shell
• SSH is a network protocol used to remotely access and
manage a device. The key difference between Telnet and SSH is that SSH uses encryption, which means that all data transmitted over a network is secure from eavesdropping. SSH uses the public key encryption for such purposes. • Like Telnet, a user accessing a remote device must have an SSH client installed. On a remote device, an SSH server must be installed and running. SSH uses the TCP port 22 by default. SSH
• Encrypted communication link
• Looks and acts the same as Telnet TELNET AND SSH