| With the rapid development of information technology, more and more information technology applications are going to deployed in a large number of enterprises and institutions. How to manage these large application servers conveniently, fast, efficiently and safely is particularly important. Because of the limitations of computer room, operation and maintenance work carried out in the engine room is impossible. Telnet access has become a common way, which is widely used in switches, routers, firewalls and other network devices remotely configure, as well as many system servers. However, the behavior of these remote access by which client connect server directly may bring us plenty of potential risks. For managers, these acts are not uncontrollable and unknown. Once the error operation, high risk of operating or malicious attacks appear, it will bring huge losses to the normal use of enterprises and institutions in various business systems. Ranging from system dysfunction, serious system crash may occur, confidential data leakage and other major information security incidents.As a result, audit of operation and maintenance system comes into being, which is also called bastion machine. As a part of the bastion machine, telnet proxy provide a proxy access method, users call the local client through web page(such as Putty, Xshell, SecureCRT, etc.),while Telnet client connect to the proxy system through the Telnet protocol port 23.Proxy system send data and command to the target server through a custom port selectively. The so-called selective is that according to pre-configured access policy of manager’s, the proxy system prevent some sensitive instructions.The proxy can also record the data of the session and time, which is saved and restored in the form of a file. And then we use the customized program show the playback in order to audit. As a result, greatly improve the security of remote access. |