We bring you another part of the series about the SSH protocol . Today we will discuss an interesting topic and how to SSH tunnels. Sending other traffic through some sort of secure SSH tunnel is an excellent way to deal with restrictive firewall settings. It’s also a great way to encrypt otherwise unencrypt network traffic.
Configuration of local tunneling to the server
Using an SSH connection, we can send traffic through a tunnel from ports on the local host to ports on the remote host.
A local connection is a way to access a network location from a local computer through a remote host. First, an SSH connection is establish on the remote host. On the remote server, a connection is made to some external (or internal) network address provid by the user, and traffic to that location is tunnel to the local computer on the specifi port.
This is often us to tunnel to a less restrictive network environment by bypassing a firewall. Another common use is to access a “localhost only” web interface from a remote location.
To establish a local tunnel to a remote server, you must use the -L parameter when you connect, and russia phone number data you must provide three additional pieces of information:
The local port where you wish to access the tunnel connection
The host to which the remote host is to connect.
The port you want the remote host to connect on.
They are list in the order list above (and separat by colons) as arguments to the -L indicator. We’ll the secret to turning around a day that starts off unproductively also use the -f flag, which causes SSH to go into the background before executing, and the -N flag, which neither opens a shell nor executes any programs on the remote set.
Since the connection is in the background, you bw lists will ne to find its PID in order to destroy it. You can do this by searching for the port you forward.