Secure Shell (SSH)

As you have probably learned already from this chapter, classic TCP/IP remote access utilities such as Telnet and the r* tools are not safe for security-conscious environments. The r* utilities are fast disappearing. Telnet persists in some limited uses—such as dial-up access and remote administration on protected networks—but most IT professionals wouldn’t dream of using Telnet on the open Internet.

At the same time, the evolution of the Internet has placed even more emphasis on networking and remote access. On today’s networks, remote shell sessions are typically managed through a suite of protocols and utilities that fall under the collective name Secure Shell (SSH). SSH is essentially equivalent to an implementation of ...

Get Sams Teach Yourself TCP/IP in 24 Hours, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.