Telnet & SSH in Hindi - Configuring Remote Access - Secure Shell

Поделиться
HTML-код
  • Опубликовано: 15 авг 2015
  • Join Live Classes - Network Engineer Master Program
    Contact Us - www.nwkings.com/network-engin...
    ✅Live batches of CCNA + CCNP + Firewalls.
    ✅24x7 Unlimited Lab Access
    ⏰ No time for Live batch? Join NWFLIX - learn.nwkings.com/s/pages/all...

Комментарии • 38

  • @nwkings

    Join Live Classes - Network Engineer Master Program

  • @rohan7387244002
    @rohan7387244002 5 лет назад +2

    all video's of networking is very nice and clear explanation and each are important thank you so much sir for provides us great knowledge...

  • @Dominic_Barone
    @Dominic_Barone 8 лет назад +1

    Another master piece by network king.

  • @Shubhamhirau
    @Shubhamhirau 6 лет назад +2

    Great Sir..You Are Donig Great job for Ccna...

  • @faisalkhan-ve1vk
    @faisalkhan-ve1vk 7 лет назад +3

    sir , as i know telnet use tcp protocal ,then it should be secure .

  • @chiranjeev93
    @chiranjeev93 7 лет назад +1

    sir please tell me what is the difference between telnet protocol and rlogin protocol in what different ways they work ?

  • @jaiairnet6952
    @jaiairnet6952 7 лет назад

    which software we can use to see our network working.like what's up gold?

  • @sanketgupta9604
    @sanketgupta9604 7 лет назад

    do devices on same lan have same public ip addresses? i got yes and no both answers. I am a bit confused. Also in above video what if u have to telnet the server connected to 200.1.1.2. Do we need external IP address?

  • @atuleshkumarsrivastav4754
    @atuleshkumarsrivastav4754 8 лет назад +1

    thank u very much

  • @mrhash_official
    @mrhash_official 3 года назад

    very well done great job the way you describe its very useful for beginners .....

  • @PraveenVas
    @PraveenVas 7 лет назад +1

    And also if we enable the command "ip http secure-server" for any other purpose then these keys itself can be used to SSH. And this does not require a domain name to generate keys.

  • @ravimalge1177
    @ravimalge1177 7 лет назад

    thank you sir.......

  • @PraveenVas
    @PraveenVas 7 лет назад +4

    "ip doman name" command we should give in order to generate encryption keys and not to resolve host name. To resolve the host name we have to give the command "ip domain-lookup" followed by the dns server address by using the command "ip name server xxxxx."

  • @rksingh4253
    @rksingh4253 6 лет назад

    Thanks very much sir

  • @navneetgupta2528
    @navneetgupta2528 2 года назад

    Really nice and understandable video.. Thx 🙏

  • @jasvinderlamba9052
    @jasvinderlamba9052 6 лет назад +1

    Hi...I have a question regarding this....when I enable telnet on router...it works fine...just after enabling SSH on same router....the SSH works but telnet does not work anymore.......

  • @rkl3692
    @rkl3692 Год назад

    Can we consider PuTTY as a middleware? Because it enhances the OS? Similarly all device driver softwares?

  • @Letsseethevideos
    @Letsseethevideos 2 года назад

    can we save backup to the TFTP by using SSH ?

  • @arunpatel6371
    @arunpatel6371 7 лет назад

    Thxxxxxx u sir !!

  • @faisalkhan-ve1vk
    @faisalkhan-ve1vk 7 лет назад

    telnet in public network has been discouraged . whyyy