let's say you have a device that you telnet to, to manage. to protect it,
you put it behind a single-floppy firewall (Coyote linux, LRP, etc).

the obvious answer is to SSH to the firewall; and then telnet to the device.
but what if you want to avoid having a user shell account on the firewall?

put another way, what's the simplest way to secure the connection to the
device (preferably without having to run a user shell on the firewall, since
it's space-limited)? is VPN the only answer, or is there something I'm
missing?

Carl Soderstrom
-- 
Network Engineer
Real-Time Enterprises
(952) 943-8700