× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



If your saying you want port 23 open to all internal devices and not to any external then that is the job of the firewall. They should be sure port 23 is not open thru the firewall. In fact they should have the firewall set to only allow port traffic they want to go thru and not have it wide open to all ports.

If your saying you want to control which internal devices you want to use port 23 then I think you need to look at using an exit point for telnet server and write you own code to test the incoming IP address or get a package like nSafe which already has he exit point code ready to go.

-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Trevor Perry
Sent: Tuesday, August 24, 2010 9:14 PM
To: Midrange Systems Technical Discussion
Subject: Securing port 23

I have a customer who has turned off port 23 and only uses SSL. We have a
requirement where we must use port 23 for unsecured telnet. How can I ensure
that opening port 23 does not expose telnet beyond their DMZ/firewall?

Thanks!

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.