Tera Term Telnet
Tera Term Telnet
Telnet 1
A successful connection will produce a session window ready
for you to log in to the selected computer:
2 Telnet
Ending A Session When you have finished the session on the remote machine,
logout in the usual way and telnet will quit automatically.
Configurations Each site name in the site lists has a configuration associated
with it, which determines the appearance of the session, such
as the font used, the size of the screen in columns and lines
and the foreground and background colours.
Changing Configuration Many features of the telnet set-up and window appearance
Settings may be customised using the Set-up menu. For example, to
change the number of columns and lines displayed, select the
Terminal Set-up option to display the following dialogue box:
Telnet 3
The first method uses a secure way of sending a password.
Password only:
The password you type in the 'passphrase' box is sent directly
to the server. (It is sent over a secure channel, so no one will
be able to read it simply by listening on the network.)
The other methods use the principal of machine-generated
private and public 'keys'. You will first need to have generated
the appropriate keys on the machine to which you want to
connect. One of these keys will then need to be copied to the
local machine:
RSA:
Select a file containing your RSA private key. You can select a
file by clicking on the button or by typing its name directly into
the box provided. This file will have been generated by the ssh-
keygen program on the machine to which you are trying to
connect. If this file is protected with a passphrase you should
type the passphrase in the 'passphrase' box.
rhosts and rhosts with RSA:
Enter the local user name that the remote side is expecting. If
you wish to prove the identity of the local machine to the server
using an RSA key, select the private key file as with plain RSA
authentication. The passphrase from the 'passphrase' box
will be used to access the key.
You should contact the system administrator of the host
machine for advice on the generation and use of appropriate
keys.
4 Telnet
Edit Copy
Copies selected text to the clipboard.
Copy table
Copies selected text to the clipboard. If the copied text consists
of words, each space between words is converted to a Tab
character. If you copy a table on the screen by using this
command, you can paste it into a spread sheet application,
like Excel.
Paste
Sends text in the clipboard to the host.
Paste <CR>
Sends text in the clipboard to the host, and then sends a new-
line code.
Clear screen
Erases the screen.
Clear buffer
Erases the scroll buffer and the screen.
Setup Terminal...
Changes the terminal emulation setup.
Window...
Changes the window setup.
Font...
Changes the font.
Keyboard...
Changes the keyboard setup.
Serial port...
Changes the serial port parameters.
TCP/IP...
Changes the TCP/IP setup.
General...
Changes the miscellaneous setup.
Save setup...
Saves the current setup to a Tera Term setup file.
Restore setup...
Restores setup data from a Tera Term setup file.
Load key map...
Load a keyboard configuration from a keyboard setup file.
Telnet 5
Reset port
Resets the serial port. This command is available only with a
serial connection.
Open TEK
Opens the TEK window.
Close TEK
Closes the TEK window.
Macro
Runs a macro file.
Help Index
Displays index of help topics.
Using help
Displays the help about Windows Help.
About Tera Term...
Displays information about Tera Term.
6 Telnet