Telnet bombardment to my unix network

Posted on 2016-08-02
Medium Priority
Last Modified: 2016-08-02
I am getting a lot of telnet session to computers with unix os on my network.  how can I eliminate such a problem from any outsider to do telnet access to the computers  while I still allow my engineer telnet access to the computers in the network.
Question by:tommym121
LVL 97

Accepted Solution

Lee W, MVP earned 2000 total points
ID: 41739618
Block Telnet at the firewall (opening it is really unwise in my opinion). Give your engineer VPN access or use a Remote Control solution.  At a minimum use SSH and NOT telnet unless you're TRYING to give out usernames and passwords to any hacker that wants them...

Author Closing Comment

ID: 41739655

Featured Post

Prepare for an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program curriculum features two internationally recognized certifications from the EC-Council at no additional time or cost.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

600 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question