<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic They want to keep both telnet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944482#M909269</link>
    <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;They want to keep both telnet &amp;amp; ssh enabled and (somehow) force admins to use SSH while leaving telnet as a backdoor / backup&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;A lot of new Cisco models now sport a Management port. &amp;nbsp;This is now the new method of OoBM. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Nov 2016 20:49:14 GMT</pubDate>
    <dc:creator>Leo Laohoo</dc:creator>
    <dc:date>2016-11-22T20:49:14Z</dc:date>
    <item>
      <title>Telnet vs SSH</title>
      <link>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944480#M909264</link>
      <description>&lt;P style="margin: 0in 0in 0pt;"&gt;Hi there,&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;Thanks for reading.&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;I’m the new admin at my organization (it’s a big, world-wide org). I’m fighting the entrenched senior leadership about telnet and ssh.&amp;nbsp; We have a few devices with telnet-only enabled.&amp;nbsp; The devices I’ve discovered are access layer in the center of a site known for rogue-IT and –users!&amp;nbsp; Of course, telnet has to go, right?&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;I’ve encountered major, unexpected pushback. The argument is ease over security.&amp;nbsp; I’m at the CCNA level.&amp;nbsp; They’re at NP or IE level.&amp;nbsp; Their talking points are:&lt;/P&gt;
&lt;UL style="list-style-type: disc; direction: ltr;"&gt;
&lt;LI style="font-size: 11pt;"&gt;Too busy to draft a strategy (they only work the REALLY complicated issues)&lt;/LI&gt;
&lt;LI style="color: #000000; font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;SSH overhead – Can’t reach a device experiencing 99% CPU usage, telnet can&lt;/LI&gt;
&lt;LI style="color: #000000; font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;They want to keep both telnet &amp;amp; ssh enabled and (somehow) force admins to use SSH while leaving telnet as a backdoor / backup&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;My only idea to “meet” this ‘requirement’: line vty 0 14 transport input ssh; line vty 15 transport telnet.&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;I assume even that would fail: a session requesting telnet would go straight to line 15?&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;Thanks again!&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;Bob&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944480#M909264</guid>
      <dc:creator>Bob Greer</dc:creator>
      <dc:date>2020-02-21T13:57:59Z</dc:date>
    </item>
    <item>
      <title>SSH overhead – Can’t reach a</title>
      <link>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944481#M909266</link>
      <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;SSH overhead – Can’t reach a device experiencing 99% CPU usage, telnet can&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Bull$hit! &amp;nbsp;If the CPU is at 99%, not even console works. &amp;nbsp;Ask them to prove it. &amp;nbsp;I have 15.0(2)SE3 which can send CPU up to 100%. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Next, HOW OFTEN does an appliance gets loaded with a buggy IOS that sends CPU up to 99%. &amp;nbsp;IF there is one right now in the network, then it's not a telnet vs SSH but rather the reluctance to do anything attitude. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Finally, going from telnet to SSH requires the appliance to load Crypto software image. &amp;nbsp;Question: Does anyone actually know how to upgrade the appliance? &amp;nbsp;(You don't want to know the answer to this question.)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 20:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944481#M909266</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2016-11-22T20:30:38Z</dc:date>
    </item>
    <item>
      <title>They want to keep both telnet</title>
      <link>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944482#M909269</link>
      <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;They want to keep both telnet &amp;amp; ssh enabled and (somehow) force admins to use SSH while leaving telnet as a backdoor / backup&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;A lot of new Cisco models now sport a Management port. &amp;nbsp;This is now the new method of OoBM. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 20:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944482#M909269</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2016-11-22T20:49:14Z</dc:date>
    </item>
    <item>
      <title>I agree with everything that</title>
      <link>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944483#M909271</link>
      <description>&lt;P&gt;I agree with everything that Leo said. I would try to dig a bit deeper and figure out the exact reasons behind this. If no good reasons are provided then your peers are just being lazy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Leaving telnet enabled is a bad idea. Mgmt traffic can be captured and credentials extracted. This can be a huge issue especially if OOM is not used.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, leaving telnet enabled will lead to failures all sorts of audits and assessments. I don't know which organization you work for but if it is a big/world-wide then I would not be surprised if&amp;nbsp;you are failing several compliance/legal requirements.&lt;/P&gt;
&lt;P&gt;You can leave line 15 with telnet but in order for that to work you will need to use "rotaries" and tie a specific port to that vty line. For more info take a look at this link:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.packetu.com/2012/08/09/using-an-alternate-telnet-port-in-cisco-ios/"&gt;http://www.packetu.com/2012/08/09/using-an-alternate-telnet-port-in-cisco-ios/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 00:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944483#M909271</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-11-23T00:28:00Z</dc:date>
    </item>
    <item>
      <title>Hi guys,Thanks for writing. </title>
      <link>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944484#M909273</link>
      <description>&lt;P&gt;Hi guys,&lt;BR /&gt;Thanks for writing.&amp;nbsp; The rotary solution looks like it might fit.&amp;nbsp; I am stunned by the militant pushback I'm getting.&amp;nbsp; I was expecting red-faced agreement!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anyway, thanks again for your input!&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 17:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-vs-ssh/m-p/2944484#M909273</guid>
      <dc:creator>Bob Greer</dc:creator>
      <dc:date>2016-11-23T17:44:15Z</dc:date>
    </item>
  </channel>
</rss>

