R3721-F3210-F3171-HP High-End Firewalls System Management and Maintenance Configuration Guide-6PW101

141
Configuring RSH
The RSH configuration is available only at the CLI.
RSH overview
Remote shell (RSH) allows you to execute the commands provided by the operating system (OS) on a
remote host. The remote host must run the RSH daemon.
The firewall can serve as an RSH client and provides the rsh command as the tool for the RSH
feature. Figure 66 sho
ws a typical application scenario.
Figure 66 RSH application
The RSH daemon supports authentication of an RSH client by the username. To enable or disable the RSH
daemon on Windows NT, 2000, XP, or 2003, use the Services component.
Configuration procedure
Complete the following tasks before you configure RSH:
Run RSH daemon on the remote host.
Make sure that the firewall and the remote host have IP connectivity between them.
Execute a remote host's OS command from the firewall by executing the following command:
Task Command
Remarks
Execute an OS command of a
remote host.
rsh host [ user username ]
command remote-command
Available in user view
NOTE:
If RSH daemon authentication is enabled on the remote host, you must provide the username confi
g
ured
on the remote host in advance.
RSH configuration example
Network requirements
As shown in Figure 67, run Windows 2000 on the remote host and start the RSH daemon service on it.
Use the firewall to set the time of the remote host remotely.