Would having the SNA go to a Linux image, perhaps in an IFL LPAR in the
same box an your VM system, running Comm Server solve the problem? 

Regards, 
Richard Schuh 

 

> -----Original Message-----
> From: The IBM z/VM Operating System 
> [mailto:[EMAIL PROTECTED] On Behalf Of Thomas Kern
> Sent: Monday, April 28, 2008 10:48 AM
> To: IBMVM@LISTSERV.UARK.EDU
> Subject: Re: VTAM on an IFL?
> 
> Cheating like that can get you visited by armed Marines, etc.
> 
> I doubt that any traffic between two DOD bases is unencrypted 
> and tapping=
> 
> the coax cables inside the bases will get you in even more trouble. 
> 
> /Thomas Kern
> /U.S. Department of Energy
> /301-903-2211 (O)
> /301-905-6427 (M)
> 
> 
> On Mon, 28 Apr 2008 13:35:31 -0400, Alan Altmark 
> <[EMAIL PROTECTED]
> >
> wrote:
> >Start the telnet server listening on port 22 (the ssh port) and 
> >configur=
> e
> >your (secure) telnet client to connect to it.  Et voila!  No more 
> >nasty,=
> 
> >smelly port 23!
> >
> >Even though it's an SNA network, don't you still have the policy of 
> >encrypting passwords over a network?  (Undoubtedly the rationale for 
> >burying evil telnet in favor of the angelic ssh.)
> >
> >Alan Altmark
> >z/VM Development
> >IBM Endicott
> 

Reply via email to