0% found this document useful (0 votes)
32 views8 pages

Default Gateway - Proxy ARP, Telnet and SSH

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views8 pages

Default Gateway - Proxy ARP, Telnet and SSH

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Default gateway,

Proxy ARP, Telnet


and SSH
Default gateway:-

Default gateway is used for communicating to other network


hosts.
Proxy ARP:
Proxy ARP is used to facilitate ARP
exchanges in order to resolve IP addresses
to MAC addresses in devices that are
separated by routers in the same network
or sub-network. Routers cannot forward
Layer 2 packets and hence, ARP messages
are never propagated outside of their
networks. When a device wants to resolve
the MAC address of another device in a
different subnet, the router located
between the two subnets acts as a proxy
for the other device and responds to the
ARP broadcast with its own MAC address.
What is Telnet?
TELNET stands for TErminaL NETwork. It is a type of protocol that enables
one computer to connect to local computer. It is a used as a standard TCP/IP
protocol for virtual terminal service which is given by ISO. Computer which
starts connection known as the local computer. Computer which is being
connected to i.e. which accepts the connection known as remote computer.
When the connection is established between local and remote computer
during telnet operation whatever that is being performed on the remote
computer will be displayed by local computer. Telnet operates on client/server
principle. Local computer uses telnet client program and the remote
computers uses telnet server program.
Key points to remember about Telnet
• Telnet is an application-layer protocol and allows a user to connect to an
account on another remote machine.
• Telnet uses port 23, which was designed specifically for local area
networks.
• Telnet is the standard TCP/IP protocol for virtual terminal service.
• Telnet transfers the data in plain text.
• Telnet is vulnerable to security attacks.
• No privileges are provided for the user's authentication.
• Required low bandwidth usage.
• Used in Linux and Windows Operating system.
What is SSH?
Secure Shell (SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network. Typical applications include
remote command-line, login, and remote command execution but any network
service can be secured with SSH.
SSH provides a secure channel over an unsecured network by using a client–
server architecture, connecting an SSH client application with an SSH server.
The protocol specification distinguishes between two major versions, referred
to as SSH-1 and SSH-2.
SSH was designed as a replacement for Telnet and for unsecured remote shell
protocols
Key points to remember about SSH
• SSH is an application-layer protocol and allows a user to connect to an
account on another remote machine in a secure way.
• SSH runs on port 22 by default, which you can change it.
• SSH works on TCP protocol
• SSH uses encrypted format to send data and also uses a secure channel.
• SSH helps you to overcome many security issues of Telnet.
• SSH is a more secure protocol, so it uses public-key encryption for
authentication.
• Required high bandwidth usage.
• Used in all popular Operating systems.
Difference between
SSH and Telnet

You might also like