SSH tunneling explained: A tutorial on SSH port forwarding

<p>The <a href=”https://www.techtarget.com/searchsecurity/definition/Secure-Shell”>Secure Shell</a> protocol defines a mechanism for securely connecting to a remote host. SSH replaced <a href=”https://www.techtarget.com/searchnetworking/definition/Telnet”>Telnet</a>, the original internet application for running remote login sessions.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Over the years, SSH has become much more than a terminal emulation tool, largely due to its ability to securely route network traffic using <a href=”https://www.techtarget.com/searchnetworking/definition/port”>ports</a> and host systems defined by the user. These connections are called <i>tunnels</i> because they provide a connection through which users can transmit data securely over an unsecured network.</p>
<p>Let’s take a deeper look at SSH tunneling, including how it works and the various types of SSH tunnels, before diving into the tutorials for setting up each type of tunnel.</p>
<section class=”section main-article-chapter” data-menu-title=”What is SSH tunneling?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>What is SSH tunneling?</h2>
<p>An SSH tunnel is a secure connection between an SSH client and an SSH server. The local machine routes network traffic from an arbitrary port through the SSH connection to a specified port — usually TCP port 22 — on the remote system.</p>
<p>SSH tunnels network traffic through application ports from the localhost to a remote system or vice versa. SSH tunneling, also known as <i>SSH port forwarding</i>, enables two systems to exchange data securely through <a href=”https://www.techtarget.com/searchsecurity/feature/The-five-different-types-of-firewalls”>firewalls</a> across an intranet and the internet. It is also a critical component of cloud administration.</p>
<p>Tunneling is useful for many purposes, including the following:</p>
<ul class=”default-list”>
<li>Accessing internal web services from outside a restricted network by tunneling HTTP or HTTPS traffic through an SSH port.</li>

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: