Directory › Connections › Telnet
How to Add a Telnet Connection in CyberVision
Purpose
Create a Telnet connection to access legacy network/host services through the portal.
> Note: The beginning of the flow is the same as SSH/RDP/Kubernetes (Connections → Add → Name → Protocol).
> The main differences are in telnet: Protocol Parameters and Telnet-specific authentication matching fields.
Prerequisites
- Permission to create connections in the Connections module.
- Target Telnet host/IP.
- Telnet port (default
23, if not customized). - Valid login credentials (if the target requires authentication).
- (Optional) Proxy/jump host if required by your network design.
Step-by-step
1) Create the connection
1. Open Connections.
2. Click Add.
2) Set general connection details
In the Connection section:
- Name: define a clear name (example:
TELNET - Legacy Switch 01). - Protocol: select Telnet.
Why?
- Name improves discoverability and operational consistency.
- Protocol switches the form/engine to Telnet-specific behavior.
3) Configure Proxy
In the Proxy section:
- Hostname
- Port
Why?
- Telnet targets are often in segmented/legacy networks.
- Proxy/jump routing avoids broad direct exposure.
4) (Optional) Apply Additional Connection Restrictions
As shown in the UI:
- Date and time after which this connection may be used
- Date and time before which this connection may be used
- Times connection is allowed to be used (
Add Entry) - Times connection may not be used (
Add Entry) - Hosts from which connection may be accessed (
Add Entry) - Hosts from which connection may not be accessed (
Add Entry)
Why?
- Restricts usage windows and source origins.
- Reduces attack surface and supports compliance.
5) Configure telnet: Protocol Parameters
In Network:
- Hostname: target device/server IP or DNS.
- Port: Telnet service port (usually
23).
Why?
- Defines exactly where the Telnet session will connect.
6) Configure Telnet Authentication
In Authentication:
- Username
- Password
- Username regular expression
- Password regular expression
- Login success regular expression
- Login failure regular expression
Why?
- Username/Password provide credentials when login is required.
- Username/Password regex help CyberVision detect interactive prompts from different Telnet implementations (legacy devices often vary).
- Login success regex confirms successful authentication based on terminal output.
- Login failure regex detects failed authentication and avoids ambiguous session states.
7) (Optional) Enable Recordings
In Recordings:
- Enable screen recording
- Enable text recording
Why?
- Session evidence for troubleshooting, audit, and forensic review.
- Text recording is especially useful for command-based Telnet sessions.
8) Save
- Click Save to create the connection.
- Click Cancel to discard changes.
Post-creation validation
1. Confirm the connection appears in Connections.
2. Open it and validate:
- successful TCP/Telnet reachability,
- correct prompt matching (username/password),
- expected success/failure regex behavior,
- recording behavior if enabled.
Best practices
- Use naming standard:
TELNET - <Area> - <Device>. - Prefer SSH over Telnet whenever possible (Telnet is plaintext by design).
- Keep strict source/time restrictions for Telnet connections.
- Use regex carefully and test against real device prompts.
- Periodically review and retire unused legacy Telnet entries.
Was this helpful?
Yes: 0 · No: 0
