Chapter5UsageandOperation
FIGURE35RUNNINGTHETELNET
2.ClickOK,aTelnetwindowappears,asshowninFigure36.
FIGURE36SWITCHREMOTELOGINWINDOW
3.Entertheusernameandpasswordtoentertheusermodeof
theswitch.
ConfigurationthroughSSH
Connection
TelnetandFTPconnectionsarenotsafebecausetheyusetheplain
texttotransmitthepasswordanddataonthenetwork.Thisre-
sultsindatatobeeasilyinterceptedbyattackers.Adisadvantage
oftheTelnet/FTPsecurityauthenticationisthatitiseasilyattacked
bytheman-in-the-middle.Thisimitatestheservertoreceivethe
datasentbytheclientandimitatestheclienttotransmitthedata
totherealserver .
SSHcansolvethishiddentrouble.TheSSHsetsupasecurity
channelfortheremoteloginonnon-securitynetworkandother
networktoencryptandcompressalltransmitteddata.Inthis
way,nousefulinformationcanbeobtainedintheinterception.
CondentialandProprietaryInformationofZTECORPORATION45