0% found this document useful (0 votes)
9 views

null

The document provides an overview of Telnet and SSH protocols, detailing their functionalities, usage, and configuration steps. Telnet is a text-oriented application protocol for bidirectional communication over TCP port 23, while SSH is a secure method for remote login using TCP port 22, offering strong encryption and authentication. The document also outlines specific applications for both protocols and includes configuration steps for each.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

null

The document provides an overview of Telnet and SSH protocols, detailing their functionalities, usage, and configuration steps. Telnet is a text-oriented application protocol for bidirectional communication over TCP port 23, while SSH is a secure method for remote login using TCP port 22, offering strong encryption and authentication. The document also outlines specific applications for both protocols and includes configuration steps for each.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

TELNET AND SSH PROTOCOLS

Telnet
-is an application protocol used on the Internet or Local Area Network to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection and its control information is interspersed in-band with user data in an
8-bit oriented data connection over the Transmission Control Protocol (TCP) port
23.
- User data is interspersed in-band with TELNET control information.
- The user’s computer, which initiates the connection, is referred to as the local
computer
- The computer being connected to which accepts the connection is referred to as
the remote computer. The remote computer can be physically located in the next
room, the next town or in another country.
- The Telnet program runs on the computer and connects your PC to a server on
the network we can then enter commands through the Telnet program and they
will be executed as if we were entering them directly on the server console.
- This enables us to control the server and communicate with other servers on the
network.
- To start a Telnet session, we must log in to a server by entering a valid
username and password.
-Telnet can be used to connect to virtually any machine that listens on ports, in
other words, you can connect to any machine that has certain ports open and
once connected to a machine, you need to issue UNIX based commands to
interact with the remote service.
-For example, a user don’t need to login, check and send mails only through his
e-mail service provider’s interface but this can be achieved using simple telnet
commands.
-telnet client and server functionality comes built-in in most operating systems,
however, there are several third-party applications like putty client that enable
remote connectivity.
Steps to connect to a remote host using Telnet
1. Open Telnet by clicking on Start menu and choose run, now type Telnet, and
press Enter key from the keyboard or by clicking on the OK button.

2. From the Menu, choose Connect. Remote

3. Enter the name or IP address of the system that you want to connect to in the
Host Name Field.

4. If required, a port in the Port field.

5. In the term Type, select the type of terminal that you want Telnet to emulate.

6. After you are finished with the remote host, you can disconnect from a remote
host by choosing Connect, Disconnect
TERMINAL EMULATION

-A personal computer can connect via Modem to a large computer and run a
terminal emulation program and the most common terminal emulation is the
VT100.
-The computer works like a dumb terminal, except it is connected via a phone line
instead of a direct connection. Often, you will not be able to use graphics on the
Internet, such as the WWW (World Wide Web), this kind of access, although you
will be able to browse the text-only portion of the Web.
This kind of Internet account is sometimes called “Shell” account. This shell
account is available with VSNL for students in India. Many terminal emulation
programs can emulate DEC terminals, including the VT52 and VT200 series
terminals. For example, vty pathname of your terminal’s device file.

The syntax for this command is


vty [option]
The options are:
1. -1 Prints the synchronous line number.
2. -s Causes vty not to print any output but sets the exit status to 0 if the standard
input file is a terminal, and to 1 if it is not
Telnet is generally used with the following applications :

(1) Enterprise networks to access host applications, e.g. on IBM Mainframes.

(2) Administration of network elements, e.g., in commissioning, integration and


maintenance of core network elements in mobile communication networks.

(3) MUD games played over the Internet, as well as talkers, MUSHes, MUCKs,
MOOes, and the resurgent BBS community.

(4) embedded systems.


Telnet configuration on a router
Telnet example:
SECURE SHELL (SSH)

-is a method for secure remote login from one computer to another and
provides several alternative options for strong authentication, and it
protects the communications security and integrity with strong
encryption while
-SSH is a much safer protocol than the Telnet protocol and uses the TCP
22 port by default.

There are 2 versions of the SSH protocol.


These; Version 1 and Version 2.
-SSH V1 exploits several patented encryption algorithms and is
vulnerable to a well-known vulnerability that could allow an attacker to
enter data into the communication flow.
-SSH V2, this release has an advanced key exchange algorithm that is
not vulnerable to the same abuse and includes more powerful and
comprehensive features:
• Encryption such as 3DES and AES.
• Use voice encryption Message Verification Code (MAC) algorithms for
integrity checking.
• Support for public-key certificates.
SECURE SHELL (SSH) CONFIGURATION
(SSH) STEPS
1.First, run Packet Tracer and then create a network topology
2. Open the CLI prompt by clicking on the SYSNETTECH Router and
press Enter to skip the initial configuration.
3. To enable SSH on the router, perform the SSH configuration steps.
4. Configure the IP settings of PC1
5. To quickly configure the R1’s interface, double-click on it, click the
Config tab in the window that opens, and then configure the Port
Status option of the GigabitEthernet0/0 interface to On, then assign
the IP address
6. To test whether SSH is running, open the PC1 prompt and establish
a connection
7. Enter the user name and password you created, and as soon as you
press Enter, the connection will be established
8. After executing the show ssh command on PC1 Command Prompt,
you can check the version of the SSH protocol that is linked.
9. Make SSH from router to router for execution
10. Enter the user account information you created on the Cisco
Router and press Enter
(SSH) CONFIGURATION
“THE END”

“THANK YOU”

You might also like