MindTerm-SSH-HOWTO

MindTerm-SSH-HOWTO - Encrypted Tunnels using SSH and...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Encrypted Tunnels using SSH and MindTerm HOWTO Duane Dunston duane@duane.yi.org Revision History Revision 1.01 2001-06-13 Revised by: PDD Changed date format (YYYY-MM-DD) This document describes how to use SSH and the Java-based program MindTerm to create quick, secure, and reliable VPN-like tunnels over insecure networks. Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. Copyright Information......................................................................................................................1 1.2. Disclaimer.........................................................................................................................................1 1.3. New Versions....................................................................................................................................2 1.4. Credits...............................................................................................................................................2 1.5. Feedback...........................................................................................................................................2 2. Before we start.................................................................................................................................................3 2.1. Mindterm and SSH Introduction.......................................................................................................3 2.2. MindTerm and SSH..........................................................................................................................4 2.3. How MindTerm and SSH work together..........................................................................................5 3. Software Installation.......................................................................................................................................6 4. Server and Client Configurations..................................................................................................................7 4.1. Server Configuration.........................................................................................................................7 4.2. Client Configuration.........................................................................................................................7 5. Creating the tunnels........................................................................................................................................9 6. MindTerm over the web...............................................................................................................................13 7. Security considerations.................................................................................................................................15 8. Conclusion.....................................................................................................................................................16Conclusion....
View Full Document

Page1 / 20

MindTerm-SSH-HOWTO - Encrypted Tunnels using SSH and...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online