Security Configuration
Using SSH
5-10
Using SSH and Telnet Sessions
You can combine SSH connections with Telnet connections to reach your
destination.
Figure 5-1
connections and the consequences experienced.
Preferred
Acceptable
Bad
(Password exposed here)
Figure 5-1. Security Considerations when Mixing Telnet and SSH Sessions
shows different ways to mix secure and unsecure
SSH
SSH
Telnet
SSH
SSH
Telnet