beautypg.com

Configuring rsh, Rsh overview, Configuration procedure – H3C Technologies H3C SecPath F1000-E User Manual

Page 158: Rsh configuration example, Network requirements

background image

147

Configuring RSH

The RSH configuration is available only at the CLI.

RSH overview

Remote shell (RSH) allows you to execute the commands provided by the operating system (OS) on a
remote host. The remote host must run the RSH daemon.
The firewall can serve as an RSH client and provides the rsh command as the tool for the RSH

feature.

Figure 66

shows a typical application scenario.

Figure 66 RSH application

The RSH daemon supports authentication of an RSH client by the username. To enable or disable the RSH
daemon on Windows NT, 2000, XP, or 2003, use the Services component.

Configuration procedure

Complete the following tasks before you configure RSH:

Run RSH daemon on the remote host.

Make sure that the firewall and the remote host have IP connectivity between them.

Execute a remote host’s OS command from the firewall by executing the following command:

Task Command

Remarks

Execute an OS command of a
remote host.

rsh host [ user username ]
command remote-command

Available in user view

NOTE:

If RSH daemon authentication is enabled on the remote host, you must provide the username configured
on the remote host in advance.

RSH configuration example

Network requirements

As shown in

Figure 67

, run Windows 2000 on the remote host and start the RSH daemon service on it.

Use the router to set the time of the remote host remotely.