O'Reilly logo

Next Generation SSH2 Implementation by Dale Liu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Solutions in this chapter:

  • SSH Port Forwarding Commands
  • Securing Email with SSH Local –L Port Forwarding
  • Bypassing Firewalls with SSH Remote –R Port Forwarding
  • Using SSH SOCKS Proxy –D to Tunnel Your HTTP/DNS Traffic
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

As discussed in previous chapters, SSH is a secure network protocol which allows for data to be exchanged securely between two or more computers. SSH has been mainly used by system administrators to securely manage devices such as network routers and UNIX servers as well as securely transferring files. SSH provides a secure tunnel in which all communication is encrypted.

SSH port forwarding or tunneling allows you to forward otherwise unsecure TCP ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required