0% found this document useful (0 votes)
109 views6 pages

Tera Term Telnet

Tera Term is a terminal emulation program that allows users to connect to remote computers through telnet or SSH. It provides features like file transfer, logging sessions, and customizing terminal settings. The document provides instructions on how to start a telnet session, connect to other sites, use graphics emulation, transfer files, log sessions, save customized settings, and use SSH security. Menus are detailed for common functions like file operations, editing text, and changing configurations.

Uploaded by

Jaka Edan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views6 pages

Tera Term Telnet

Tera Term is a terminal emulation program that allows users to connect to remote computers through telnet or SSH. It provides features like file transfer, logging sessions, and customizing terminal settings. The document provides instructions on how to start a telnet session, connect to other sites, use graphics emulation, transfer files, log sessions, save customized settings, and use SSH security. Menus are detailed for common functions like file operations, editing text, and changing configurations.

Uploaded by

Jaka Edan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Tera Term Telnet

Introduction Tera Term is a terminal emulation program that enables you


to log in to a remote computer, provided you have a registered
account on that machine.
Starting Telnet To start a session on a remote computer, select TeraTerm -
Telnet from the Network option of the Public menu:

The start-up screen looks like this:

A dialogue box containing a drop down list of pre-configured


hosts will be shown, including the College’s UNIX machine
Alpha, the Library service and the BIDS service at Bath.
To connect to one of these services, select the site name by
clicking on it then click on the OK button.

Telnet 1
A successful connection will produce a session window ready
for you to log in to the selected computer:

As well as a standard Windows menu bar, with all the


facilities of cut and paste editing, printing and saving, there is
a vertical scroll bar, which enables you to scroll back through
the output of a session. The menus are detailed in the
appendix to this chapter.
Connecting To To open a connection to a computer other than those already
Other Sites listed in the New Connection dialogue box, delete the selected
entry and replace it with the name of the computer to which
you wish to connect then click OK.
Graphics Emulation If your work requires graphical output (plots for example) you
can switch to an emulation of a Tektronics terminal by
choosing Open Tek from the Control menu. This starts up a
second window in which you can continue working with both
text and graphics.
File Transfer To send a file from your PC filestore to the remote machine or
host, choose Send File from the File menu. Be sure to check
the Binary check box if necessary, that is, if the file is anything
other than a plain text file.
There are several other file transfer protocols available under
the Transfer option of the File menu, including Kermit, that
allow transfer of files in either direction, provided the required
software is running at the host site.
Logging A Session You can save the output from a session by opening a log file.
To do this, choose Log… from the File menu, type in a file
name in the resulting dialogue box and select the drive on
which to save it (usually the G: drive). Anything that appears
on the screen after this will be recorded in the file.
To end recording, click on the Close button in the Log dialogue
box (note that this box may be minimised to a button on the
Windows task bar) or, if you have finished the session, just log
out.
You can also save selected text from the screen and copy it to
other applications using Copy and Paste from the Edit menu.

2 Telnet
Ending A Session When you have finished the session on the remote machine,
logout in the usual way and telnet will quit automatically.
Configurations Each site name in the site lists has a configuration associated
with it, which determines the appearance of the session, such
as the font used, the size of the screen in columns and lines
and the foreground and background colours.
Changing Configuration Many features of the telnet set-up and window appearance
Settings may be customised using the Set-up menu. For example, to
change the number of columns and lines displayed, select the
Terminal Set-up option to display the following dialogue box:

Then change the numbers in the Terminal Size boxes.


Saving Settings To save settings, including the addition of your own sites to the
sites list, choose Save Set-up from the Set-up menu, name the
settings file and select a drive (usually G:) on which to save it.
To use the settings you have saved in previous sessions, choose
Restore settings from the Set-up menu and select the
appropriate file.
SSH Security Secure Shell (SSH) is a system that provides strong
authentication and secure communications over insecure
channels. SSH protects a network from attacks such as IP
spoofing, IP source routing, and DNS spoofing.
When using SSH's login procedure the entire session,
including transmission of password, is encrypted and it is
almost impossible for an outsider to collect passwords or other
sensitive information.
To use Tera Term with SSH protection, first check the SSH
radio button in the
New Connection
window when you
start a new session.
The SSH
Authentication
window will then
offer three
authentication
methods as shown
here:

Telnet 3
The first method uses a secure way of sending a password.
Password only:
The password you type in the 'passphrase' box is sent directly
to the server. (It is sent over a secure channel, so no one will
be able to read it simply by listening on the network.)
The other methods use the principal of machine-generated
private and public 'keys'. You will first need to have generated
the appropriate keys on the machine to which you want to
connect. One of these keys will then need to be copied to the
local machine:
RSA:
Select a file containing your RSA private key. You can select a
file by clicking on the button or by typing its name directly into
the box provided. This file will have been generated by the ssh-
keygen program on the machine to which you are trying to
connect. If this file is protected with a passphrase you should
type the passphrase in the 'passphrase' box.
rhosts and rhosts with RSA:
Enter the local user name that the remote side is expecting. If
you wish to prove the identity of the local machine to the server
using an RSA key, select the private key file as with plain RSA
authentication. The passphrase from the 'passphrase' box
will be used to access the key.
You should contact the system administrator of the host
machine for advice on the generation and use of appropriate
keys.

Tera Term Appendix Menus

File New connection...


Connects to a new host or a serial port.
Log...
Logs received characters to a file.
Send file...
Sends a file to the host.
Transfer
Transfers files between the PC and the host with the
Kermit/XMODEM/ZMODEM/B-Plus/Quick-VAN protocols.
Change directory...
Changes the current directory for file transfers.
Print...
Prints the current screen, or the selected text.
Disconnect
Closes the connection. If the connection type is TCP/IP and the
Auto window close option is selected, Tera Term is also closed.
Exit
Closes Tera Term. If the connection is open, it is also closed.

4 Telnet
Edit Copy
Copies selected text to the clipboard.
Copy table
Copies selected text to the clipboard. If the copied text consists
of words, each space between words is converted to a Tab
character. If you copy a table on the screen by using this
command, you can paste it into a spread sheet application,
like Excel.
Paste
Sends text in the clipboard to the host.
Paste <CR>
Sends text in the clipboard to the host, and then sends a new-
line code.
Clear screen
Erases the screen.
Clear buffer
Erases the scroll buffer and the screen.

Setup Terminal...
Changes the terminal emulation setup.
Window...
Changes the window setup.
Font...
Changes the font.
Keyboard...
Changes the keyboard setup.
Serial port...
Changes the serial port parameters.
TCP/IP...
Changes the TCP/IP setup.
General...
Changes the miscellaneous setup.
Save setup...
Saves the current setup to a Tera Term setup file.
Restore setup...
Restores setup data from a Tera Term setup file.
Load key map...
Load a keyboard configuration from a keyboard setup file.

Control Reset terminal


Resets various terminal modes.
Are you there
Sends an AYT (Are You There) telnet signal. Usually, the
host sends back some message responding to it. This
command is available only with a telnet connection.
Send break
Sends a break signal to the host.

Telnet 5
Reset port
Resets the serial port. This command is available only with a
serial connection.
Open TEK
Opens the TEK window.
Close TEK
Closes the TEK window.
Macro
Runs a macro file.

Window You can activate an existing window by selecting it from the


list in this menu. At most 9 windows can be listed in this
menu. If actual number of windows exceeds 9 and you want to
activate a window which is not in the list, use the Window
command at the bottom of this menu.
Window...
Activates or closes a Tera-Term window.

Help Index
Displays index of help topics.
Using help
Displays the help about Windows Help.
About Tera Term...
Displays information about Tera Term.

6 Telnet

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy