• No results found

Tera Term Telnet. Introduction

N/A
N/A
Protected

Academic year: 2021

Share "Tera Term Telnet. Introduction"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine.

To start a session on a remote computer, select TeraTerm -Telnet from the Network option of the Public menu:

The start-up screen looks like this:

A dialogue box containing a drop down list of pre-configured hosts will be shown, including the College’s UNIX machine Alpha, the Library service and the BIDS service at Bath. To connect to one of these services, select the site name by clicking on it then click on the OK button.

Tera Term Telnet

Introduction

(2)

A successful connection will produce a session window ready for you to log in to the selected computer:

As well as a standard Windows menu bar, with all the

facilities of cut and paste editing, printing and saving, there is a vertical scroll bar, which enables you to scroll back through the output of a session. The menus are detailed in the

appendix to this chapter.

To open a connection to a computer other than those already listed in the New Connection dialogue box, delete the selected entry and replace it with the name of the computer to which you wish to connect then click OK.

If your work requires graphical output (plots for example) you can switch to an emulation of a Tektronics terminal by

choosing Open Tek from the Control menu. This starts up a second window in which you can continue working with both text and graphics.

To send a file from your PC filestore to the remote machine or host, choose Send File from the File menu. Be sure to check the Binary check box if necessary, that is, if the file is anything other than a plain text file.

There are several other file transfer protocols available under the Transfer option of the File menu, including Kermit, that allow transfer of files in either direction, provided the required software is running at the host site.

You can save the output from a session by opening a log file. To do this, choose Log… from the File menu, type in a file name in the resulting dialogue box and select the drive on which to save it (usually the G: drive). Anything that appears on the screen after this will be recorded in the file.

(3)

When you have finished the session on the remote machine, logout in the usual way and telnet will quit automatically. Each site name in the site lists has a configuration associated with it, which determines the appearance of the session, such as the font used, the size of the screen in columns and lines and the foreground and background colours.

Many features of the telnet set-up and window appearance may be customised using the Set-up menu. For example, to change the number of columns and lines displayed, select the Terminal Set-up option to display the following dialogue box:

Then change the numbers in the Terminal Size boxes.

To save settings, including the addition of your own sites to the sites list, choose Save Set-up from the Set-up menu, name the settings file and select a drive (usually G:) on which to save it. To use the settings you have saved in previous sessions, choose Restore settings from the Set-up menu and select the

appropriate file.

Secure Shell (SSH) is a system that provides strong

authentication and secure communications over insecure channels. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing.

When using SSH's login procedure the entire session, including transmission of password, is encrypted and it is almost impossible for an outsider to collect passwords or other sensitive information.

To use Tera Term with SSH protection, first check the SSH radio button in the

New Connection window when you start a new session. The SSH

(4)

The first method uses a secure way of sending a password. Password only:

The password you type in the 'passphrase' box is sent directly to the server. (It is sent over a secure channel, so no one will be able to read it simply by listening on the network.)

The other methods use the principal of machine-generated private and public 'keys'. You will first need to have generated the appropriate keys on the machine to which you want to connect. One of these keys will then need to be copied to the local machine:

RSA:

Select a file containing your RSA private key. You can select a file by clicking on the button or by typing its name directly into the box provided. This file will have been generated by the ssh-keygen program on the machine to which you are trying to connect. If this file is protected with a passphrase you should type the passphrase in the 'passphrase' box.

rhosts and rhosts with RSA:

Enter the local user name that the remote side is expecting. If you wish to prove the identity of the local machine to the server using an RSA key, select the private key file as with plain RSA authentication. The passphrase from the 'passphrase' box will be used to access the key.

You should contact the system administrator of the host machine for advice on the generation and use of appropriate keys.

Menus

New connection...

Connects to a new host or a serial port. Log...

Logs received characters to a file. Send file...

Sends a file to the host. Transfer

Transfers files between the PC and the host with the

Kermit/XMODEM/ZMODEM/B-Plus/Quick-VAN protocols. Change directory...

Changes the current directory for file transfers. Print...

Prints the current screen, or the selected text. Disconnect

Closes the connection. If the connection type is TCP/IP and the Auto window close option is selected, Tera Term is also closed. Exit

Tera Term Appendix

(5)

Copy

Copies selected text to the clipboard. Copy table

Copies selected text to the clipboard. If the copied text consists of words, each space between words is converted to a Tab character. If you copy a table on the screen by using this command, you can paste it into a spread sheet application, like Excel.

Paste

Sends text in the clipboard to the host. Paste <CR>

Sends text in the clipboard to the host, and then sends a new-line code.

Clear screen Erases the screen. Clear buffer

Erases the scroll buffer and the screen.

Terminal...

Changes the terminal emulation setup. Window...

Changes the window setup. Font...

Changes the font. Keyboard...

Changes the keyboard setup. Serial port...

Changes the serial port parameters. TCP/IP...

Changes the TCP/IP setup. General...

Changes the miscellaneous setup. Save setup...

Saves the current setup to a Tera Term setup file. Restore setup...

Restores setup data from a Tera Term setup file. Load key map...

Load a keyboard configuration from a keyboard setup file.

Reset terminal

Resets various terminal modes. Are you there

Sends an AYT (Are You There) telnet signal. Usually, the host sends back some message responding to it. This command is available only with a telnet connection. Send break

Sends a break signal to the host. Edit

Setup

(6)

Reset port

Resets the serial port. This command is available only with a serial connection.

Open TEK

Opens the TEK window. Close TEK

Closes the TEK window. Macro

Runs a macro file.

You can activate an existing window by selecting it from the list in this menu. At most 9 windows can be listed in this menu. If actual number of windows exceeds 9 and you want to activate a window which is not in the list, use the Window command at the bottom of this menu.

Window...

Activates or closes a Tera-Term window.

Index

Displays index of help topics. Using help

Displays the help about Windows Help. About Tera Term...

Displays information about Tera Term. Window

References

Related documents

This paper reformulates the neoclassical Solow-Swan model of economic growth in discrete time by introducing a generic population growth law that verifies the following properties:

When the profiles to average are separated by a time interval shorter than the PSC correlation timescales (and so PSC profiles with similar characteristics are averaged), the

Players should select one character to use a free action to make a Dungeon Hazard check: Dungeon Hazard.. Class TN# Thief, Ranger 3 Fighter, Druid 4 Mage, Priest

Egy fontért lehet belépni, Agatha azonban biztosra vette, hogy így is nagy tömeg lesz, mivel még időben elhelyezett egy ingyenital feliratú táblát a főút

The interim review phase is conducted during the month of June-July between the line manager and his/her employee in order to review the progress towards meeting

From the Quick Menu on the left hand side of the screen, select the Settings Icon (it looks like a wheel), then from the menu select Permission Groups.. You are now

□ My annual processing fee of $30 and first week’s tuition is not required because I will receive financial assistance from the State of Vermont Department of Children and

When our Prom night came, you just don't know how happy I was when you handed me the corsage and said that I was the loveliest girl in the whole world.. While we were dancing,