This configuration example describes how to use Secure Sockets Layer (SSL) to secure Telnet on your system.
Bob is in the process of creating a home-based brokerage business. He retires from his position as a stockbroker at a major trading firm, and wants to continue to offer brokerage services to a small number of clients from his home. He runs his business on a small system, which he would like to use to provide account access to his clients, through 5250 Telnet sessions. Bob is currently working on a way to allow his clients continuous access to their accounts, so that they can manage their shareholdings. Bob wants his clients to use 5250 Telnet sessions to access their accounts, but he is concerned about the security of his server, as well as the security of his clients' sessions. After researching the Telnet security options, Bob decides to use Secure Sockets Layer (SSL) to ensure the privacy of data over 5250 Telnet sessions between his server and clients.
In this scenario, Bob wants to secure his brokerage clients' 5250 Telnet sessions to their shareholder accounts on his system. Bob wants to enable SSL to protect the privacy of client data as it passes through the Internet. He also wants to enable certificates for client authentication to ensure that his system verifies that only his clients are accessing their accounts. After Bob has configured the Telnet server for SSL and enabled client and server authentication, he can roll out this new account accessibility option to his clients, assuring them that their 5250 Telnet sessions are secure:
In this scenario, the setup for the brokerage business is as follows:
This scenario makes the following assumptions:
There are two sets of tasks that Bob must complete to implement this scenario: one set of tasks allows him to set up his system to use SSL and requires certificates for user authentication; the other set of tasks allows users on Telnet clients to participate in SSL sessions with Bob's Telnet server and to obtain certificates for user authentication.
Bob performs the following task steps to complete this scenario:
Telnet server task steps
To implement this scenario, Bob must perform these tasks on his system:
Client configuration task steps
To implement this scenario, each user who accesses the Telnet server on Bob's system must perform these tasks:
These tasks accomplish both SSL and client authentication by certificates, resulting in SSL-secured access to account information for Bob's clients using 5250 Telnet sessions.