3com 3031 Instruccion De Instalación
![3com](https://files.manualsbrain.com/attachments/960452ff43b9899cbcffced60c87abf956e7967a/common/fit/150/50/f6ac125d7af2cf40fec58935fa6d4bf71457a57efe50bee91208a434f325/brand_logo.jpeg)
Secure Shell (SSH)
111
The main function of PAD is to assemble a string of characters generated in the
non-packet terminal to packets in the sending side, so as to send them to the
packet switched network. And it will disassemble the packets received in the
receiving side to characters for the non-packet terminal to receive.
non-packet terminal to packets in the sending side, so as to send them to the
packet switched network. And it will disassemble the packets received in the
receiving side to characters for the non-packet terminal to receive.
The software supports X.25 PAD function which acts as a bridge to make
non-X.25 terminals access the X.25 network. You can add a device called PAD
between the X.25 network and terminals that do not support X.25 procedures to
enable the latter to communicate with other terminals through the X.25 network.
Therefore, X.25 PAD devices actually serve as a procedure translator or network
server, providing services to different terminals to help them access the X.25
network.
non-X.25 terminals access the X.25 network. You can add a device called PAD
between the X.25 network and terminals that do not support X.25 procedures to
enable the latter to communicate with other terminals through the X.25 network.
Therefore, X.25 PAD devices actually serve as a procedure translator or network
server, providing services to different terminals to help them access the X.25
network.
For details about PAD terminal services, refer to Chapter 26 “X.25 and LAPB
Configurations”.
Configurations”.
Secure Shell (SSH)
SSH is only available through Extended V2.00 software.
SSH Introduction
When the user telnets to the router through one network environment not
guaranteeing security, the SSH feature can provide secure information guarantee
and powerful authentication function to protect the router from such attacks as IP
address cheating and the intercepting of plain text password. The router can
accept multiple SSH client connections and support multiple SSH client
connections SSH client enables the user to establish connection with routers or
UNIX hosts supporting SSH server. Displayed as in Figure 24 and Figure 25. SSH
channel can be established to build local connection and WAN (Wide Area
Network) connection.
guaranteeing security, the SSH feature can provide secure information guarantee
and powerful authentication function to protect the router from such attacks as IP
address cheating and the intercepting of plain text password. The router can
accept multiple SSH client connections and support multiple SSH client
connections SSH client enables the user to establish connection with routers or
UNIX hosts supporting SSH server. Displayed as in Figure 24 and Figure 25. SSH
channel can be established to build local connection and WAN (Wide Area
Network) connection.
Figure 24 Establishing SSH channel in LAN
LAN SSH connection
Workstation
Workstation
Server
Terminal running SSH
LAN
100BASE-TX network interface
LAN environment
establis hed through
HUB or LANSWITCH
Route
r
through hub or lan switch
LAN environment established