Chapter 13. Solutions in this chapter:

  • SSH Port Forwarding Commands
  • Securing Email with SSH Local –L Port Forwarding
  • Bypassing Firewalls with SSH Remote –R Port Forwarding
  • Using SSH SOCKS Proxy –D to Tunnel Your HTTP/DNS Traffic
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

As discussed in previous chapters, SSH is a secure network protocol which allows for data to be exchanged securely between two or more computers. SSH has been mainly used by system administrators to securely manage devices such as network routers and UNIX servers as well as securely transferring files. SSH provides a secure tunnel in which all communication is encrypted.

SSH port forwarding or tunneling allows you to forward otherwise unsecure TCP ...

Get Next Generation SSH2 Implementation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.