I have a group that is requesting thrid party access through a VPN tunnel to a couple servers. I have requested they use somethig more than simple telnet as it is not secure. The group is saying that since the tunnel is secure why should they use anything else. Anyone have any references to documentation to help me explaine my case.
I have this problem too.