Tera Term Telnet. Introduction



Similar documents
SSH access to databases at DIMDI

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter

Installing the SSH Client v3.2.2 For Microsoft Windows

F-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

TELNET CLIENT 5.11 SSH SUPPORT

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Using SSH Secure Shell Client for FTP

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Getting Started. A Getting Started Guide for Locum RealTime Monitor. Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Remote Desktop In OpenSUSE 10.3

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII

Network FAX Driver. Operation Guide

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

How To Industrial Networking

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

Configuration Guide. Remote Backups How-To Guide. Overview

AnzioWin FTP Dialog. AnzioWin version 15.0 and later

Install and configure SSH server

VPN Overview. The path for wireless VPN users

RSA SecurID Token User Guide February 12, 2015

How to set up your Secure in Outlook 2010*

Cloudvue Remote Desktop Client GUI User Guide

IIS, FTP Server and Windows

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

MATLAB on EC2 Instructions Guide

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.

F-SECURE MESSAGING SECURITY GATEWAY

Clearswift Information Governance

Quick Scan Features Setup Guide. Scan to Setup. See also: System Administration Guide: Contains details about setup.

Immotec Systems, Inc. SQL Server 2005 Installation Document

Web File Management with SSH Secure Shell 3.2.3

Allworx Installation Course

Steps for using MagicConnect

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

Campus VPN. Version 1.0 September 22, 2008

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload For Windows For Macintosh...

F-Secure Messaging Security Gateway. Deployment Guide

File Transfers. Contents

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Install MS SQL Server 2012 Express Edition

X Series Application Note 43:

Lab Configure Basic AP Security through IOS CLI

Windows Server 2008 R2 Initial Configuration Tasks

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

Scan to Quick Setup Guide

Avalanche Enabler 5.3 User Guide

Chapter 5 - Ethernet Setup

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

Configuring the WT-4 for ftp (Ad-hoc Mode)

Remote Access to Unix Machines

DDNS Management System User Manual V1.0

Shellshock Security Patch for X86

Configure thin client settings locally

Using WS_FTP. This tutorial explains how to use WS_FTP, a File Transfer Program for Microsoft Windows. INFORMATION SYSTEMS SERVICES.

Lab 8.3.3b Configuring a Remote Router Using SSH

CPEi 800/825 Series. User Manual. * Please see the Introduction Section

How to use FTP Commander

DiskPulse DISK CHANGE MONITOR

Configuration Manual

Steps for using MagicConnect

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

Internet Access to a DVR365

How-to: Single Sign-On

System Area Manager. Remote Management

DDM Distributed Database Manager for SQL and ODBC. Installation and User Guide Version 5.27.xx

Step-by-Step Setup Guide Wireless File Transmitter

Getting Started with POS. Omni POS Getting Started Manual. switched on accounting

SSL VPN Setup for Windows

Step-by-Step Setup Guide Wireless File Transmitter

Avaya Network Configuration Manager User Guide

Terminal Server Guide

Polycom RealPresence Desktop for Windows

Personal Call Manager User Guide. BCM Business Communications Manager

WSNetServer User Manual. Date: July

BSDI Advanced Fitness & Wellness Software

Installing the Microsoft Network Driver Interface

Configuring Keystroke with KeyPay

SQL Tuning and Maintenance for the Altiris Deployment Server express database.

Configuring Basic Settings

Quick Scan Features Setup Guide

ICE. TCP PLUS. J. River, Inc. ICE.TCP PLUS Programs. DejaWinT with SSH FTP Pro ICElp Printing Network Toolbox

Discovery Guide. Secret Server. Table of Contents

Setting Up Scan to SMB on TaskALFA series MFP s.

Job Aid: Creating Additional Remote Access Logins

1. Set Daylight Savings Time Create Migrator Account Assign Migrator Account to Administrator group... 4

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section

Mac OS VPN Set Up Guide

Avalanche Remote Control User Guide. Version 4.1.3

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

INPS Remote Vision MIQUEST Training Manual

Instructions for Microsoft Outlook 2003

5nine Hyper-V Commander

Broadband Router ESG-103. User s Guide

Transcription:

Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start a session on a remote computer, select TeraTerm - Telnet from the Network option of the Public menu: The start-up screen looks like this: A dialogue box containing a drop down list of pre-configured hosts will be shown, including the College s UNIX machine Alpha, the Library service and the BIDS service at Bath. To connect to one of these services, select the site name by clicking on it then click on the OK button. Telnet 1

A successful connection will produce a session window ready for you to log in to the selected computer: Connecting To Other Sites Graphics Emulation File Transfer Logging A Session As well as a standard Windows menu bar, with all the facilities of cut and paste editing, printing and saving, there is a vertical scroll bar, which enables you to scroll back through the output of a session. The menus are detailed in the appendix to this chapter. To open a connection to a computer other than those already listed in the New Connection dialogue box, delete the selected entry and replace it with the name of the computer to which you wish to connect then click OK. If your work requires graphical output (plots for example) you can switch to an emulation of a Tektronics terminal by choosing Open Tek from the Control menu. This starts up a second window in which you can continue working with both text and graphics. To send a file from your PC filestore to the remote machine or host, choose Send File from the File menu. Be sure to check the Binary check box if necessary, that is, if the file is anything other than a plain text file. There are several other file transfer protocols available under the Transfer option of the File menu, including Kermit, that allow transfer of files in either direction, provided the required software is running at the host site. You can save the output from a session by opening a log file. To do this, choose Log from the File menu, type in a file name in the resulting dialogue box and select the drive on which to save it (usually the G: drive). Anything that appears on the screen after this will be recorded in the file. To end recording, click on the Close button in the Log dialogue box (note that this box may be minimised to a button on the Windows task bar) or, if you have finished the session, just log out. You can also save selected text from the screen and copy it to other applications using Copy and Paste from the Edit menu. 2 Telnet

Ending A Session Configurations Changing Configuration Settings When you have finished the session on the remote machine, logout in the usual way and telnet will quit automatically. Each site name in the site lists has a configuration associated with it, which determines the appearance of the session, such as the font used, the size of the screen in columns and lines and the foreground and background colours. Many features of the telnet set-up and window appearance may be customised using the Set-up menu. For example, to change the number of columns and lines displayed, select the Terminal Set-up option to display the following dialogue box: Saving Settings SSH Security Then change the numbers in the Terminal Size boxes. To save settings, including the addition of your own sites to the sites list, choose Save Set-up from the Set-up menu, name the settings file and select a drive (usually G:) on which to save it. To use the settings you have saved in previous sessions, choose Restore settings from the Set-up menu and select the appropriate file. Secure Shell (SSH) is a system that provides strong authentication and secure communications over insecure channels. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. When using SSH's login procedure the entire session, including transmission of password, is encrypted and it is almost impossible for an outsider to collect passwords or other sensitive information. To use Tera Term with SSH protection, first check the SSH radio button in the New Connection window when you start a new session. The SSH Authentication window will then offer three authentication methods as shown here: Telnet 3

The first method uses a secure way of sending a password. Password only: The password you type in the 'passphrase' box is sent directly to the server. (It is sent over a secure channel, so no one will be able to read it simply by listening on the network.) The other methods use the principal of machine-generated private and public 'keys'. You will first need to have generated the appropriate keys on the machine to which you want to connect. One of these keys will then need to be copied to the local machine: RSA: Select a file containing your RSA private key. You can select a file by clicking on the button or by typing its name directly into the box provided. This file will have been generated by the sshkeygen program on the machine to which you are trying to connect. If this file is protected with a passphrase you should type the passphrase in the 'passphrase' box. rhosts and rhosts with RSA: Enter the local user name that the remote side is expecting. If you wish to prove the identity of the local machine to the server using an RSA key, select the private key file as with plain RSA authentication. The passphrase from the 'passphrase' box will be used to access the key. You should contact the system administrator of the host machine for advice on the generation and use of appropriate keys. Tera Term Appendix File Menus New connection... Connects to a new host or a serial port. Log... Logs received characters to a file. Send file... Sends a file to the host. Transfer Transfers files between the PC and the host with the Kermit/XMODEM/ZMODEM/B-Plus/Quick-VAN protocols. Change directory... Changes the current directory for file transfers. Print... Prints the current screen, or the selected text. Disconnect Closes the connection. If the connection type is TCP/IP and the Auto window close option is selected, Tera Term is also closed. Exit Closes Tera Term. If the connection is open, it is also closed. 4 Telnet

Edit Copy Copies selected text to the clipboard. Copy table Copies selected text to the clipboard. If the copied text consists of words, each space between words is converted to a Tab character. If you copy a table on the screen by using this command, you can paste it into a spread sheet application, like Excel. Paste Sends text in the clipboard to the host. Paste <CR> Sends text in the clipboard to the host, and then sends a newline code. Clear screen Erases the screen. Clear buffer Erases the scroll buffer and the screen. Setup Terminal... Changes the terminal emulation setup. Window... Changes the window setup. Font... Changes the font. Keyboard... Changes the keyboard setup. Serial port... Changes the serial port parameters. TCP/IP... Changes the TCP/IP setup. General... Changes the miscellaneous setup. Save setup... Saves the current setup to a Tera Term setup file. Restore setup... Restores setup data from a Tera Term setup file. Load key map... Load a keyboard configuration from a keyboard setup file. Control Reset terminal Resets various terminal modes. Are you there Sends an AYT (Are You There) telnet signal. Usually, the host sends back some message responding to it. This command is available only with a telnet connection. Send break Sends a break signal to the host. Telnet 5

Reset port Resets the serial port. This command is available only with a serial connection. Open TEK Opens the TEK window. Close TEK Closes the TEK window. Macro Runs a macro file. Window You can activate an existing window by selecting it from the list in this menu. At most 9 windows can be listed in this menu. If actual number of windows exceeds 9 and you want to activate a window which is not in the list, use the Window command at the bottom of this menu. Window... Activates or closes a Tera-Term window. Help Index Displays index of help topics. Using help Displays the help about Windows Help. About Tera Term... Displays information about Tera Term. 6 Telnet