SSH (Secure Shell) protocol provides the three main ideas of security authentication, confidentiality (via encryption) and integrity of data transfer over a network. SSH (Secure Shell) is a protocol which define how to connect securely over a network. Network administrators must disable telnet and use only SSH wherever possible. Telnet is used only as network testing tool like ping or netstat these days. SSH supports authentication, confidentiality and integrity for remote administration. SSH replaced telnet and SSH is much more secure than telnet. Telnet is an insecure protocol for remote server configuration. ![]() ![]() ![]() Telnet was the protocol which Network Administrators were using for accessing the CLI console of a server or a network device remotely.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |