Would having the SNA go to a Linux image, perhaps in an IFL LPAR in the same box an your VM system, running Comm Server solve the problem?
Regards, Richard Schuh > -----Original Message----- > From: The IBM z/VM Operating System > [mailto:[EMAIL PROTECTED] On Behalf Of Thomas Kern > Sent: Monday, April 28, 2008 10:48 AM > To: IBMVM@LISTSERV.UARK.EDU > Subject: Re: VTAM on an IFL? > > Cheating like that can get you visited by armed Marines, etc. > > I doubt that any traffic between two DOD bases is unencrypted > and tapping= > > the coax cables inside the bases will get you in even more trouble. > > /Thomas Kern > /U.S. Department of Energy > /301-903-2211 (O) > /301-905-6427 (M) > > > On Mon, 28 Apr 2008 13:35:31 -0400, Alan Altmark > <[EMAIL PROTECTED] > > > wrote: > >Start the telnet server listening on port 22 (the ssh port) and > >configur= > e > >your (secure) telnet client to connect to it. Et voila! No more > >nasty,= > > >smelly port 23! > > > >Even though it's an SNA network, don't you still have the policy of > >encrypting passwords over a network? (Undoubtedly the rationale for > >burying evil telnet in favor of the angelic ssh.) > > > >Alan Altmark > >z/VM Development > >IBM Endicott >