Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is telnet,ssh??
what is the perpose of this?
wer r this configured and how to configured??

Answers were Sorted based on User's Feedback



what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??..

Answer / jitendera sinha

do you know shridh i used telnet process to hack another
network.but don't do that becoz u r a employ and i am a fresher.

Is This Answer Correct ?    2 Yes 0 No

what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??..

Answer / jitendera sinha

telnet-telnet is a process by which you can configure
router/switch having any physical connection by any means.

let understand it with a example
supose you are working in such comany that have one barnch
in bangalore and 2nd in punee.now you are workin in bangalore
after some time network of pune have some prob.the employ
have coneected you to solve it.then what do you do u donot
go the pune becoz it take time so telnet help you
by the telnet you can troublshoot the network of pune by
seating in the bangalore
so i can say that by telnet u can access the remote network
this is tellnet.


SSH allows users to log into host systems remotely. Unlike
rlogin or telnet SSH encrypts the login session, making it
impossible for intruders to collect clear-text passwords.

SSH is designed to replace older, less secure terminal
applications used to log into remote systems, such as telnet
or rsh. A related program called scp replaces older programs
designed to copy files between hosts, such as ftp or rcp.
Because these older applications do not encrypt passwords
between the client and the server, you should avoid them
whenever possible. Using secure methods to remotely log into
other systems will decrease the security risks for both your
system and the system you are logging into.
Features of SSH

SSH (or Secure SHell) is a protocol for creating a secure
connection between two systems using a client server
architecture. Under the SSH protocol, the client machine
initiates all connections to a server.

The SSH protocol provides the following safeguards:

*

After an initial connection, the client verifies it is
connecting to the same server during subsequent sessions.
*

The client transmits its authentication information to
the server, such as a username and password, in an encrypted
format.
*

All data sent and received during the connection is
transferred using strong, 128 bit encryption, making
intercepted transmissions extremely difficult to decrypt and
read.
*

The client has the ability to use X11 [1] applications
launched from the shell prompt. This technique, called X11
forwarding, provides a secure means to use graphical
applications over a network.


now how to configured the telnet and how to use it
go to router(config)#line vty 0 4
router(config-line)#login
router(config-line)#password *****

now how to use telnet

step 1 go to cmd mode
step 2 type telnet
microsft telnet> type here open
to (type default gateway ip address of router)
after that
another window open
login name:type the login name
password:
after entering the password
you are able to telnet process

NOTE-telnet is also known as remote access


thanks
by jitendera sinha.i did done some spelling and
grammatically mistake plz forgave me.it was a long question
and it is possible that there is lots of speel mistake

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the command to display the configured IP routing protocols? A.) show protocols B.) show protocols all C.) show routing-protocols D.) show ip protocols

2 Answers  


Which two physical interfaces support PPP? (Choose two) A. Ethernet B. Token Ring C. Synchronous serial D. Asynchronous serial

1 Answers  


Which of the following do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE

1 Answers  


If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through

1 Answers  


Name the command we give on privilege mode for coming back to user execution mode?

0 Answers  


let there are three switch and there are 3 ree valn craed on each switch that is vlan 2 on first switch valn 3 on 2nd switch and vlan 4 is cretaed on switch 3 i have implemnted intervlan routin through ciso switchses. the router is conected through its fa0/1 port by one switch and and the two switch are trunked with each other now question is that we want to comuniacte betwwen vlan but does alse want that only vlan 2 is allow to access internet (ISP)which is conected through s0 interface of router.and no any vlan can access that internet.what should be solution.

1 Answers  


can we measure how much a host exact bandwidth using by a network cable which is communicating over the network? options: 1- via Router 2- Switch, 3- other device... if yes.. then how ( with every option)

3 Answers  


State the difference between dynamic IP and static IP addressing?

0 Answers  


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  


Name the different types of networks

0 Answers  


What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain

1 Answers  


Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch

3 Answers  


Categories