You can use the
Secure Shell (SSH) server to enable an SSH client to make a secure, encrypted
connection to a
device. SSH uses strong encryption for authentication. The SSH server in the
software can interoperate with publicly and commercially available SSH clients.
The SSH client in
software works with publicly and commercially available SSH servers.
The Telnet protocol
enables TCP/IP connections to a host. Telnet allows a user at one site to
establish a TCP connection to a login server at another site and then passes
the keystrokes from one device to the other. Telnet can accept either an IP
address or a domain name as the remote device address.
For more information, see the Configuring SSH and Telnet chapter.