If you have a linux guest that is "close" to VM in the sense that ip traffic does not have to traverse subnets that you dont control, you can use ssh to create an encrypted tunnel to VM through the linux guest
eg. (assuming all linux boxes here:) on localhost: ssh [EMAIL PROTECTED] -L 2323:vmhost.domain.com:23 then on you can fire up x3270 localhost:2323 to get an encrypted tunnel <almost> all the way to vmhost.domain.com
If you use windows for localhost then you can do the same thing using putty Under Connection | SSH | Tunnels setup a new local forwarded port Source port 2323 Destination vmhost.domain.com:23 Then SSH connect to linuxguest.domain.com to setup the port 2323 encrypted tunnel to vmhost.domain.com
(There aught to be a way to do this using stunnel instead of ssh ....)
---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390
