In an age of more or less constant attacks against our networks and computers, secure
communications are more important than ever. The Secure Shell (SSH) protocols provide secure
drop-in replacements for traditional communication tools such as telnet and ftp. In addition to
describing the SSH protocols, how they work, and how they can be used to perform the familiar
telnet and ftp functions, this chapter explores using SSH to link any two applications securely,
and even how to set up an ad hoc VPN that links two networks.
Read Chapter 7,
from VPNs Illustrated: Tunnels, VPNs, and IPsec
written by Jon C. Snader and published by
This was first published in January 2007
Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.