VPNs: SSH

This chapter explores using SSH to link any two applications securely, and even how to set up an ad hoc VPN that links two networks.

In an age of more or less constant attacks against our networks and computers, secure communications are more important than ever. The Secure Shell (SSH) protocols provide secure drop-in replacements for traditional communication tools such as telnet and ftp. In addition to describing the SSH protocols, how they work, and how they can be used to perform the familiar telnet and ftp functions, this chapter explores using SSH to link any...

two applications securely, and even how to set up an ad hoc VPN that links two networks.

Read Chapter 7, SSH from VPNs Illustrated: Tunnels, VPNs, and IPsec written by Jon C. Snader and published by Addison-Wesley Professional.


This was first published in January 2007

Dig deeper on Network security products, technologies, services

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close