Multiple features of AIX telnet

Source: Internet
Author: User

In the learning of AIX telnet, we have learned the basic information about this application. Here we will explain some of its specific functions and commands. First, let's take a look at the terminal negotiation from the console and use the EMULATE environment variable or the-e flag. If you need a 3270 simulation, call the tn3270 command. to determine whether terminal type negotiation is performed, the following list describes the order in which the AIX telnet command is processed:

-E command line flag. No negotiation .)

EMULATE environment variable. No negotiation .)

Tn3270 command. No negotiation .)

If steps 1, 2, and 3 do not exist, the terminal type negotiation automatically occurs.

If the client and server negotiate to use the 3270 data stream, the keyboard ing is determined by the following priority:

$ HOME/. 3270 keys: when you call the tn or AIX telnet command, specify the user's 3270 keyboard ing. If you are using a color display, you can also change the file to customize the color of the 3270 display.

/Etc/map3270 when the tn3270 command is called, the user's 3270 keyboard ing is specified. The file/etc/map3270 defines the keyboard ing and the color of the tn3270 command.

/Etc/3270. keys specifies the basic 3270 keyboard ing for terminals with limited functions.

Security note key SAK) Option

In addition to terminal negotiation, the telnet command allows the security note key SAK) negotiation option. when this option is supported, it provides a secure communication path for local users, such as changing user IDs and passwords, to remote hosts. if the remote host supports the SAK function, a trusted shell is enabled on the remote host when the telnetsend sak sub-command is sent. the SAK function can also be assigned to a single key variable in telnet input mode. Use the set sak sub-command.

Tail conventions

Telnet protocol defines carriage return line feed CR-LF) sequence to represent the end of the line "end-of-line "). for Terminal input, it corresponds to the Command executed by the user terminal or the end key of the line. on an ASCII terminal, This is a CR key, but it may also be marked as "Return" or "Enter ".

When the telnet server receives the end sequence of the telnet line, that is, the CR-LF entered from the remote terminal, the effect is the same as the user presses the end key on the local terminal.

On the ASCII server, receiving the telnet sequence CR-LF works the same way as pressing the CR key on the local terminal by the local user. on an ASCII server, when the CR-LF and CR-NUL are received as input from a telnet connection, the validity period is the same.

Note: Telnet users must be able to send CR-LF, CR-NULL, or LF. ASCII users must be able to send CR-LF or CR-NULL.

The Telnet user should have a user-controllable way to send the CR-LF or CR-NULL.CR-LF on the acⅱ host when the user ends by row. telnet Line End sequence, CR-LF, must be used to send telnet data not from terminal to computer. for example, when the telnet server sends the output or when the telnet protocol merges another application protocol, it will happen.

Run the exec command in the AIX telnet command)/usr/sbin/login command to verify the user. it 1) allows all users and device properties to take effect on the telnet connection; 2) enables the telnet connection count to register the maximum number of sessions allowed at a time is determined by the maxlogins attribute ). the attribute is defined in the file/etc/security/user and/etc/security/login. in the cfg file.

Restrictions

The telnet command of earlier versions is not compatible with the AIX V4 and later versions of the telnet command. the AIX V4 of the telnet command and the modified version only send one escape character when hiding the Escape key, while the previous version only sends two escape characters.

The telnet command must be allowed to transmit eight characters not in binary format to implement the ISO 8859 Latin code page. This is required for the internationalization of TCP/IP commands.

To support the new character set combination, the following content is added to the hft-m, ibm5081, hft, hft-nam, hft-c, aixterm-m, and aixterm entries of the terminfo file:

Box1 = \ 154 \ 161 \ 153 \ 170 \ 152 \ 155 \ 167 \ 165 \ 166 \ 164 \ 156, batt1 = f1,

Box2 = \ 154 \ 161 \ 153 \ 170 \ 152 \ 155 \ 167 \ 165 \ 166 \ 164 \ 156, batt2 = f1md,

Font0 = \ E (B, font1 = \ E (0, rlogind and telnetd daemon use POSIX line rules to change line rules on local tty. if the POSIX line procedure is not used for a local tty, echo other line procedures may cause incorrect behavior. AIX TCP/IP must have POSIX line rules to work properly.

You cannot use the mouse as the input device when using the telnet command.

The AIX telnet command does not support APL data streams.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.