fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Using SSH to Securely Tunnel a TCP Application

windchill features best plm software
Written by Mike Solinap
Published on June 28, 2012

Often times, I’m caught in a situation where an application or service is not directly accessible to me from the network I’m currently on.  For instance, if I’m at a customer site, I may need VNC or RDP access to a collocated server.  Sure, I could open up port 5901 to the Internet on my firewall, but that would be ill advised, as VNC sends passwords in clear text.  Even still, the site I’m at may have port 5901 outbound blocked.

Similarly, there have been situations where customers have two or more separate networks, joined only by certain multi-homed machines, or privileged machines in terms of router access lists.  How do you then go about accessing a web app, for instance, via those machines?

Take another situation — you’re at the airport looking for public WiFi.  You join a wireless network which you believe is legitimate.  Can you be certain?  When privacy is of concern, I immediately open up an SSH tunnel to my personal Linux machine where a squid proxy is running, and I tunnel all web traffic through that.

Not only does SSH provide encryption, but it can also provide compression.  So applications such as VNC and HTTP further benefit from this, especially when you’re on a WAN link with limited bandwidth.

The list of potential situations where an SSH tunnel would be useful is endless, continue reading to become an SSH tunnel guru in no time.  If you have any unique uses for SSH tunneling, I’d like to hear them!

Michael Solinap
Sr. Systems Integrator
SPK & Associates

Latest White Papers

Windows Server on Azure Ultimate Guide

Windows Server on Azure Ultimate Guide

As technology progresses, more and more businesses are adopting cloud infrastructure. This shift can be difficult to adapt to, but it doesn't have to be. With Windows Server and Microsoft Azure, businesses can easily integrate their data and applications with the...

Related Resources

Unique Threat Intelligence

Unique Threat Intelligence

Ensuring online data security is one of the main priorities of every organization. Threat intelligence is an important aspect of these security measures. Threat intelligence is all the knowledge that helps organizations understand and prevent security threats. Let’s...

The Future of CAD with PTC Creo and Artificial Intelligence

The Future of CAD with PTC Creo and Artificial Intelligence

The seemingly endless debate of Artificial Intelligence's benefits and drawbacks has permeated all technological media. Why is this such a hot topic? The public wants to understand what AI can do, the technologies it can benefit, and what the future holds for AI....

Bill of Materials Strategies for PTC Windchill PLM Success

Bill of Materials Strategies for PTC Windchill PLM Success

PLM solutions like PTC Windchill help organizations manage every facet of the product lifecycle. One of the best features for organizing these components is a Bill of Materials (BOM). Many PLM solutions integrate BOM management because it facilitates collaboration...