×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
Hi Rich -
I don't recall for sure if it's available at V5R4, but you should look at using Packet Rules (in iNav under Network >> IP Policies >> Packet Rules)
You can use these to restrict Telnet by subnet and/or port. Any traffic outside of your allowed traffic doesn't get to the O/S at all.
Regards,
Scott Ingvaldson
Senior IBM Support Specialist
-----Original Message-----
From: Rich Loeber [mailto:rich@xxxxxxxxx]
Sent: Monday, May 16, 2011 2:46 PM
To: Midrange Systems Technical Discussion
Subject: Telnet Hacker
Hello List,
I have a hacker who has been trying once per second for the last several
hours to establish a Telnet connection with my IBM i server. They are
cycling through port numbers one at a time. Our exit point software is
preventing them from connecting because they are not coming from an
authorized IP address, but I'd like to shut them down earlier in the
process. Is there an easy way to just turn certain port numbers OFF?
I'm running V5R4 on the server. I looked at port restrictions, but it
seems like this is based on user profile for this version of the OS.
Rich Loeber - @richloeber
Kisco Information Systems
[1]
http://www.kisco.com
SDG
References
Visible links
1.
http://www.kisco.com/
As an Amazon Associate we earn from qualifying purchases.