EasyManua.ls Logo

Black Box LES1508A - Page 157

Black Box LES1508A
334 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
_____________________________________________________________________
724-746-5500 | blackbox.com Page 157
!U7!1 2 - !+ (' !62 , , ' 6 3$, 4 !+ %!+,!231.#.$4(54"(!=$,!3#'!P+5O$,g!4(2-NJE!3#',!12-!6+,!62,,'63!32!
+,1!62,7$4-('5!\2%3!2(!;'($+.!W2(3%!=3#+3!#+%!;X"!',+R.'5JM!
"2!%'3!-N!3#'!%'6-('!;;\!3-,,'.!72(!+!\""W!R(2/%'(!62,,'63$2, !32!3#' !* +, +4' 5!X '< $6'E!%N' 6$71!N2(3!CB!
=$,%3'+5!27!N2(3!G GC `!3#+ 3!/+ %!-% '5 !72(!LX W J !$,!3#'!X'%3$, + 3$2 , !UW !+ 5 5( '% %M!!
"2!%'3!-N!3#'!%'6-('!;;\!3-,,'.!7(2O!3#'!: .$',3!=] $'/ ' (J!W:!32 !3#'! !" #$"%&'$&()&(!72(!]T : E!72..2/ !3#' !
%3'N%!+R2<'E!R-3!/#',!12-!62, 7$4-('!3#'!]T:!N2 (3!('5$('63$2,E!%N'6$71!N2(3!A`BB!$,!3#'!X'%3$,+3$2,!UW!
+55('%%M!
Note How secure is VNC? VNC access generally allows access to your whole computer, so security is
very important. VNC uses a random challenge-response system to provide the basic
authentication that allows you to connect to a VNC server. This is reasonably secure and the
password is not sent over the network.
Once connected, all subsequent VNC traffic is unencrypted. A malicious user could snoop your
VNC session. There are also VNC scanning programs available, which will scan a subnet looking
for PCs that are listening on one of the ports that VNC uses.
Tunneling VNC over a SSH connection ensures all traffic is strongly encrypted. No VNC port is
ever open to the internet, so anyone scanning for open VNC ports will not be able to find your
computers. When tunneling VNC over a SSH connection, the only port that you’re opening on
your console server is the SDT port 22.
Sometimes it may be prudent to tunnel VNC through SSH even when the Viewer PC and the
console server are both on the same local network.
'

Table of Contents

Other manuals for Black Box LES1508A

Related product manuals