let's say you have a device that you telnet to, to manage. to protect it, you put it behind a single-floppy firewall (Coyote linux, LRP, etc). the obvious answer is to SSH to the firewall; and then telnet to the device. but what if you want to avoid having a user shell account on the firewall? put another way, what's the simplest way to secure the connection to the device (preferably without having to run a user shell on the firewall, since it's space-limited)? is VPN the only answer, or is there something I'm missing? Carl Soderstrom -- Network Engineer Real-Time Enterprises (952) 943-8700