TCP/IP Information
Copyright © 1997 by International Business Machines Corporation

TCP/IP Configuration Notebook Online Help


Configuring RSHD Access

Use the Configure RSHD Access page from the Security tab to configure and enable remote users to access the TCP/IP server RSH on this computer. The RSH server requires a remote user's host computer to have an entry in the local RHOSTS file. The RSH server validates the remote user's access using the RHOSTS file, which is made up of the list of users established on this page. If no user is specified for a remote host in the RHOSTS file, any user on that host can be served. If a user is specified, however, only that user can obtain RSH service. Only one user can be specified for each host. No password is required.

To allow remote users to access this computer using RSHD, you must create this user list and start the RSH server. You can set up RSHD to start automatically by using the Autostart tab of the TCP/IP Configuration Notebook. RSHD users working remotely can then use the RSH command to issue their own commands on this computer. Responses are returned to the user's remote computer.


[ Top of Page | Previous Page | Next Page | Table of Contents ]