1.6.1 Disable Telnet Access

Information

Telnet is a clear-text administrative protocol. As such, both the credentials used to establish the session and all commands and data within the session are readable in clear-text, so can be intercepted or modified by an attacker

Telnet doesn't natively support encryption or message integrity checks. Hence, any transmitted information (including credentials) is exposed to an attacker that gains access to the communication. Furthermore communication could be intercepted and modified by a man-in-the-middle attacker.

Solution

It's recommended to restrict VTYs to SSH for management access and not allow this device to SSH to other devices:

vty-pool default 0 4 line-template default
line default
transport input ssh
transport output none

Impact:

Ensure you have already configured an alternative management access to the device before disabling telnet access. Otherwise you might be locked out of the device with no management access.

See Also

https://workbench.cisecurity.org/benchmarks/10473

Item Details

Category: CONFIGURATION MANAGEMENT, MAINTENANCE

References: 800-53|CM-7, 800-53|MA-4

Plugin: Cisco

Control ID: 367d6d18557460782f12433fea00510ea6acf057222628248e4f31ddaab58f20