Configuration Through Ssh Connection; Figure 35 Running The Telnet; Figure 36 Switch Remote Login Window - Zte ZXR10 2900 Series User Manual

Intelligent
Table of Contents

Advertisement

F
35 RUNNING THE TELNET
IGURE
2. Click OK, a Telnet window appears, as shown in
F
36 SWITCH REMOTE LOGIN WINDOW
IGURE
3. Enter the username and password to enter the user mode of
the switch.
Configuration through SSH
Connection
Telnet and FTP connections are not safe because they use the plain
text to transmit the password and data on the network. This re-
sults in data to be easily intercepted by attackers. A disadvantage
of the Telnet/FTP security authentication is that it is easily attacked
by the man-in-the-middle. This imitates the server to receive the
data sent by the client and imitates the client to transmit the data
to the real server.
SSH can solve this hidden trouble. The SSH sets up a security
channel for the remote login on non-security network and other
network to encrypt and compress all transmitted data. In this
way, no useful information can be obtained in the interception.
Confidential and Proprietary Information of ZTE CORPORATION
Chapter 5 Usage and Operation
Figure
36.
45

Advertisement

Table of Contents
loading

Table of Contents