Remote-access Guide

berkeley remote access commands system settings

by Mireya Fahey I Published 2 years ago Updated 1 year ago
image

What is the Berkeley remote login command?

The Berkeley remote login command (rlogin) allows a user to easily access a remote UNIX host over a TCP/IP internetwork. A user would normally use rlogin when he or she needs to log in to a server to perform a number of tasks. There are some situations, however, where a user needs to only enter one command on a remote host.

What is UC Berkeley's security policy for devices handling data?

UC Berkeley security policy mandates compliance with Minimum Security Standard for Electronic Information for devices handling covered data. The recommendations below are provided as optional guidance to assist with achieving requirement 3.1, Secure Device Configuration.

What are the different types of remote commands?

The following are the most common of these remote commands and briefly, how each is used: Remote Copy (rcp): This is the remote version of the UNIX copy (cp) command; it allows a file to be copied between the local host and the remote host, or between two remote hosts.

image

What is bsecure remote access?

The bSecure Remote Access VPN (Virtual Private Network ) service, using the Palo Alto Networks’ GlobalProtect software, allows CalNet ID–authenticated users to securely access the UC Berkeley network from outside of campus as if they were on campus and encrypts the information sent through the network.

What is restricted tunnel?

Restricted Tunnel is a future service that will be limited to people people that need access to sensitive systems and data. It will have increased monitoring, and will utilize many of the advanced security features of the Palo Alto Networks firewalls.

What is remote uptime?

Remote Uptime (ruptime): The UNIX command uptime is used to display how long a computer has been running since it was last booted, along with information related to its current load. ruptime is the remote version of this command; it displays the current status of each machine on the network (up or down), how long each up machine has been up since its last boot, and its load statistics.

What is a remote copy?

Remote Copy (rcp): This is the remote version of the UNIX copy (cp) command; it allows a file to be copied between the local host and the remote host, or between two remote hosts. The usual syntax is basically the same as the regular cp command, but the source and/or destination is specified as being on a remote host.

What is rlogin and rsh?

The rlogin and rsh commands are the generic members of the Berkeley r family of programs that allow remote access to a host. To complement these, a small number of specific remote commands were also defined. These are essentially remote versions of some of the more common UNIX functions instead of the command being applied to only one system, however, it is used between two systems or across all systems on a TCP/IP network.

Requirement

Resource Custodians must utilize well-managed security configurations for hardware, software, and operating systems based on an industry standard.

Description of Risk

Overly permissive default configuration settings provide an attacker with the ability to access data without authorization.

Recommendations

A critical defense mechanism against malicious activities is a securely-configured covered device, which includes the device operating system, as well as installed applications able to run as background services or daemons that allow remote access to covered device.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9