TCP/IP Information
Copyright (C) 1997, 1998 by International Business Machines Corporation

TCP/IP Configuration Notebook Online Help

Configure RSHD Access Page

Use this page to configure and enable remote users to access the TCP/IP server RSHD on this computer. The RSH server requires a remote user's host computer to have an entry in the local RHOSTS file. The RSH server validates the remote user's access using the RHOSTS file, which is made up of the list of users established on this page. If no user is specified for a remote host in the RHOSTS file, any user on that host can be served. If a user is specified, however, only that user can obtain RSH service. Only one user can be specified for each host. No password is required.

To allow remote users to access this computer using RSH, you must create this user list and start the RSHD server. You can set up RSHD to start automatically by using the Autostart tab of the TCP/IP Configuration Notebook. RSH users working remotely can then use the RSH command to issue their own commands on this computer. Responses are returned to the user's remote computer.

The fields for this page are:

Hosts Authorized to Connect to RSH Servers... list box

Contains the names of remote hosts that are authorized to issue commands on this host using RSH. This information is case-sensitive and is saved in the RSH authorizarion file, RHOSTS.

The push buttons on this page are:

Add
Insert in the list box a remote host authorized to connect your RSH server.

When you click the Add push button, the Rhosts Entry window appears.

The fields on this window are:

Host Name

Specify the name (up to 75 alphanumeric characters) of the remote host that is authorized to issue commands on this host. Do not use 32-bit dotted-decimal notation. This field is required.

Domain Name

Specify the domain (up to 255 alphanumeric characters, including the host name) of the host to which you are granting access. The domain name is part of a fully-qualified host name. This field is required.

User

Specify the name (up to 75 alphanumeric characters) of the user on the remote host that is authorized to send commands to this host. Only one user can be specified for each host. If no user is specified, any user on the remote host can send commands to this host.

This information is case-sensitive.

Additional push buttons for these windows are:

OK
Close the window and save any changes.

Cancel
Close the window and discard any changes.

Help
Get help information for this notebook page.

Change
Modify a User Name entry selected from the list box.

When you select the Change push button, the Rhosts Entry window appears.

The fields you can change from this window are:

Host Name

Specify the name (up to 75 alphanumeric characters) of the remote host that is authorized to issue commands on this host. Do not use 32-bit dotted-decimal notation. This field is required.

Domain Name

Specify the domain (up to 255 alphanumeric characters, including the host name) of the host to which you are granting access. The domain name is part of a fully-qualified host name. This field is required.

User

Specify the name (up to 75 alphanumeric characters) of the user on the remote host that is authorized to send commands to this host. Only one user can be specified for each host. If no user is specified, any user on the remote host can send commands to this host.

This information is case-sensitive.

Additional push buttons for these windows are:

OK
Close the window and save any changes.

Cancel
Close the window and discard any changes.

Help
Get help information for this notebook page.

Delete
Erase the list box entry you selected, which will be displayed in a Delete window. You cannot modify the displayed entry; click OK to delete it, or Cancel to close the window without deleting.

Undo
Remove any changes made since you last accessed this page.

OK
Close the TCP/IP Configuration Notebook and save all changes made since opening it.

Cancel
Close the TCP/IP Configuration Notebook and discard any changes made since opening it.

Help
Get help information for this notebook page.

The subtabs on this page are:

User Access
Go to the Configure User Security page.

RSHD
Go to the Configure RSHD Access page.

TFTPD
Go to the Configure TFTPD Access page.

Admin PW
Go to the IBM TCP/IP Administrator Password page.

How Do I?

For a step-by-step description of key tasks you can do from this page, go to:


[ Top of Page | Previous Page | Next Page | Table of Contents ]