Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Telnet bombardment to my unix network

Posted on 2016-08-02
2
Medium Priority
?
109 Views
Last Modified: 2016-08-02
I am getting a lot of telnet session to computers with unix os on my network.  how can I eliminate such a problem from any outsider to do telnet access to the computers  while I still allow my engineer telnet access to the computers in the network.
0
Comment
Question by:tommym121
2 Comments
 
LVL 96

Accepted Solution

by:
Lee W, MVP earned 2000 total points
ID: 41739618
Block Telnet at the firewall (opening it is really unwise in my opinion). Give your engineer VPN access or use a Remote Control solution.  At a minimum use SSH and NOT telnet unless you're TRYING to give out usernames and passwords to any hacker that wants them...
0
 

Author Closing Comment

by:tommym121
ID: 41739655
Thanks
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question