Telnet Attacks – Ways to compromise remote connection
In this article I am going to explain some of the reasons why we should switch from Telnet to SSH to get our device management secure.
But first few words about Telnet?
More than once we were in the situation where we needed to configure couple of switches and routers in the same time. More precisely, almost every time we are in a situation where we must configure or troubleshoot more devices in the same time.
Of course that we don’t want to reconnect console cable to every other switch every time we want to make a show command on it.
We want to be able to connect to all the devices in the same time and then just use multiple command prompts one for each device. In this manner we are faster in the troubleshooting process and we can make configurations steps without loosing time on transferring the console cable. Furthermore we have better overview on the configuration as we make troubleshooting commands and we can easily compare different configurations just by opening two command prompts one close to other.