Use the options in the Telnet Security page to select SSL/TLS security and proxy server options. A proxy works in conjunction with a firewall (often as part of the same system) to provide network security. A proxy acts as an intermediary to limit access between clients in an internal network and servers outside the network. Telnet, FTP, and SOCKS version 4.0 proxies are supported. If the SSL option has been installed, Telnet SSL proxies are also supported. If you have already selected Telnet as your Connection Type, you can access the Telnet Security page by choosing Settings from the Options menu. Otherwise, choose Session Type from the Options menu and change your Connection Type, then choose Settings.
To configure to use a proxy server
In the Telnet Security page under Proxy information, select your Proxy Type.
Under Proxy Address, type the Host name or IP address of your proxy server.
Under Proxy Port, type the port number of your proxy server.
If you use a Telnet or Telnet SSL proxy, type or select a command to send to the host when connecting.
If you provided connection information in the Telnet Connection - General page, your host name is automatically added to the command you select. The host port is also added if it is a number other than the default, 23.
For Telnet commands, host information is appended to the command you select. For Telnet SSL commands, it replaces variables in the command.
Table 3-34
Options |
Description |
---|---|
Type of Security |
No Security, SSL v3.0, TLS v1.0, TLS v1.2 or TLS v1.3. |
FIPS mode |
When in FIPS mode, Extra! enforces the United States government Federal Information Processing Standard (FIPS) 140-2 for this connection. Options in this dialog that do not meet this standard will make this option unavailable. |
Verify server identity |
If your administrator has configured your server for authentication, you can increase security by selecting this option. When this option is selected, the proxy server name must match the common name in the proxy servers x509 security certificate and the certificate must be verified against the root certificate database. |
Proxy Type |
Select Telnet to use a Telnet proxy. Select SOCKS to use a SOCKS version 4.0 proxy. Select No Proxy if you have a direct connection to the Internet, that is, you do not connect through a proxy. |
Proxy Address |
Type the host name or IP address of your proxy server. |
Proxy Port |
Type the port number for your proxy server. |