admin 管理员组文章数量: 887031
2023年12月23日发(作者:trans指令)
Tera Term TelnetIntroductionTera Term is a terminal emulation program that enables youto log in to a remote computer, provided you have a registeredaccount on that start a session on a remote computer, select TeraTerm -Telnet from the Network option of the Public menu:Starting TelnetThe start-up screen looks like this:A dialogue box containing a drop down list of pre-configuredhosts will be shown, including the College’s UNIX machineAlpha, the Library service and the BIDS service at connect to one of these services, select the site name byclicking on it then click on the OK 1
Connecting ToOther SitesGraphics EmulationFile TransferLogging A Session2TelnetA successful connection will produce a session window readyfor you to log in to the selected computer:As well as a standard Windows menu bar, with all thefacilities of cut and paste editing, printing and saving, there isa vertical scroll bar, which enables you to scroll back throughthe output of a session. The menus are detailed in theappendix to this open a connection to a computer other than those alreadylisted in the New Connection dialogue box, delete the selectedentry and replace it with the name of the computer to whichyou wish to connect then click your work requires graphical output (plots for example) youcan switch to an emulation of a Tektronics terminal bychoosing Open Tek from the Control menu. This starts up asecond window in which you can continue working with bothtext and send a file from your PC filestore to the remote machine orhost, choose Send File from the File menu. Be sure to checkthe Binary check box if necessary, that is, if the file is anythingother than a plain text are several other file transfer protocols available underthe Transfer option of the File menu, including Kermit, thatallow transfer of files in either direction, provided the requiredsoftware is running at the host can save the output from a session by opening a log do this, choose Log… from the File menu, type in a filename in the resulting dialogue box and select the drive onwhich to save it (usually the G: drive). Anything that appearson the screen after this will be recorded in the end recording, click on the Close button in the Log dialoguebox (note that this box may be minimised to a button on theWindows task bar) or, if you have finished the session, just can also save selected text from the screen and copy it toother applications using Copy and Paste from the Edit menu.
Ending A SessionConfigurationsChanging ConfigurationSettingsSaving SettingsSSH SecurityWhen you have finished the session on the remote machine,logout in the usual way and telnet will quit site name in the site lists has a configuration associatedwith it, which determines the appearance of the session, suchas the font used, the size of the screen in columns and linesand the foreground and background features of the telnet set-up and window appearancemay be customised using the Set-up menu. For example, tochange the number of columns and lines displayed, select theTerminal Set-up option to display the following dialogue box:Then change the numbers in the Terminal Size save settings, including the addition of your own sites to thesites list, choose Save Set-up from the Set-up menu, name thesettings file and select a drive (usually G:) on which to save use the settings you have saved in previous sessions, chooseRestore settings from the Set-up menu and select theappropriate Shell (SSH) is a system that provides strongauthentication and secure communications over insecurechannels. SSH protects a network from attacks such as IPspoofing, IP source routing, and DNS using SSH's login procedure the entire session,including transmission of password, is encrypted and it isalmost impossible for an outsider to collect passwords or othersensitive use Tera Term with SSH protection, first check the SSHradio button in theNew Connectionwindow when youstart a new SSHAuthenticationwindow will thenoffer threeauthenticationmethods as shownhere:Telnet3
Tera Term AppendixFile4TelnetThe first method uses a secure way of sending a rd only:The password you type in the 'passphrase' box is sent directlyto the server. (It is sent over a secure channel, so no one willbe able to read it simply by listening on the network.)The other methods use the principal of machine-generatedprivate and public 'keys'. You will first need to have generatedthe appropriate keys on the machine to which you want toconnect. One of these keys will then need to be copied to thelocal machine:RSA:Select a file containing your RSA private key. You can select afile by clicking on the button or by typing its name directly intothe box provided. This file will have been generated by the ssh-keygen program on the machine to which you are trying toconnect. If this file is protected with a passphrase you shouldtype the passphrase in the 'passphrase' and rhosts with RSA:Enter the local user name that the remote side is expecting. Ifyou wish to prove the identity of the local machine to the serverusing an RSA key, select the private key file as with plain RSAauthentication. The passphrase from the 'passphrase' boxwill be used to access the should contact the system administrator of the hostmachine for advice on the generation and use of Connects to a new host or a serial ...Logs received characters to a Sends a file to the erTransfers files between the PC and the host with theKermit/XMODEM/ZMODEM/B-Plus/Quick-VAN Changes the current directory for file ...Prints the current screen, or the selected nectCloses the connection. If the connection type is TCP/IP and theAuto window close option is selected, Tera Term is also oses Tera Term. If the connection is open, it is also closed.
EditCopyCopies selected text to the tableCopies selected text to the clipboard. If the copied text consistsof words, each space between words is converted to a Tabcharacter. If you copy a table on the screen by using thiscommand, you can paste it into a spread sheet application,like ends text in the clipboard to the
WindowHelp6TelnetReset portResets the serial port. This command is available only with aserial TEKOpens the TEK TEKCloses the TEK uns a macro can activate an existing window by selecting it from thelist in this menu. At most 9 windows can be listed in thismenu. If actual number of windows exceeds 9 and you want toactivate a window which is not in the list, use the Windowcommand at the bottom of this ...Activates or closes a Tera-Term isplays index of help helpDisplays the help about Windows Displays information about Tera Term.
版权声明:本文标题:Tera Term 入门 教程 ( Linux ) 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.freenas.com.cn/free/1703319662h446754.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论