We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8
Default gateway,
Proxy ARP, Telnet
and SSH Default gateway:-
Default gateway is used for communicating to other network
hosts. Proxy ARP: Proxy ARP is used to facilitate ARP exchanges in order to resolve IP addresses to MAC addresses in devices that are separated by routers in the same network or sub-network. Routers cannot forward Layer 2 packets and hence, ARP messages are never propagated outside of their networks. When a device wants to resolve the MAC address of another device in a different subnet, the router located between the two subnets acts as a proxy for the other device and responds to the ARP broadcast with its own MAC address. What is Telnet? TELNET stands for TErminaL NETwork. It is a type of protocol that enables one computer to connect to local computer. It is a used as a standard TCP/IP protocol for virtual terminal service which is given by ISO. Computer which starts connection known as the local computer. Computer which is being connected to i.e. which accepts the connection known as remote computer. When the connection is established between local and remote computer during telnet operation whatever that is being performed on the remote computer will be displayed by local computer. Telnet operates on client/server principle. Local computer uses telnet client program and the remote computers uses telnet server program. Key points to remember about Telnet • Telnet is an application-layer protocol and allows a user to connect to an account on another remote machine. • Telnet uses port 23, which was designed specifically for local area networks. • Telnet is the standard TCP/IP protocol for virtual terminal service. • Telnet transfers the data in plain text. • Telnet is vulnerable to security attacks. • No privileges are provided for the user's authentication. • Required low bandwidth usage. • Used in Linux and Windows Operating system. What is SSH? Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution but any network service can be secured with SSH. SSH provides a secure channel over an unsecured network by using a client– server architecture, connecting an SSH client application with an SSH server. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2. SSH was designed as a replacement for Telnet and for unsecured remote shell protocols Key points to remember about SSH • SSH is an application-layer protocol and allows a user to connect to an account on another remote machine in a secure way. • SSH runs on port 22 by default, which you can change it. • SSH works on TCP protocol • SSH uses encrypted format to send data and also uses a secure channel. • SSH helps you to overcome many security issues of Telnet. • SSH is a more secure protocol, so it uses public-key encryption for authentication. • Required high bandwidth usage. • Used in all popular Operating systems. Difference between SSH and Telnet