fbpx
spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Using SSH to Securely Tunnel a TCP Application

windchill features best plm software
Written by Mike Solinap
Published on June 28, 2012

Often times, I’m caught in a situation where an application or service is not directly accessible to me from the network I’m currently on.  For instance, if I’m at a customer site, I may need VNC or RDP access to a collocated server.  Sure, I could open up port 5901 to the Internet on my firewall, but that would be ill advised, as VNC sends passwords in clear text.  Even still, the site I’m at may have port 5901 outbound blocked.

Similarly, there have been situations where customers have two or more separate networks, joined only by certain multi-homed machines, or privileged machines in terms of router access lists.  How do you then go about accessing a web app, for instance, via those machines?

Take another situation — you’re at the airport looking for public WiFi.  You join a wireless network which you believe is legitimate.  Can you be certain?  When privacy is of concern, I immediately open up an SSH tunnel to my personal Linux machine where a squid proxy is running, and I tunnel all web traffic through that.

Not only does SSH provide encryption, but it can also provide compression.  So applications such as VNC and HTTP further benefit from this, especially when you’re on a WAN link with limited bandwidth.

The list of potential situations where an SSH tunnel would be useful is endless, continue reading to become an SSH tunnel guru in no time.  If you have any unique uses for SSH tunneling, I’d like to hear them!

Michael Solinap
Sr. Systems Integrator
SPK & Associates

Latest White Papers

How Creo Supports Sustainable Product Development

How Creo Supports Sustainable Product Development

Developing products can lead to environmental costs based on the materials used and how they are handled pre- and post-production. Let’s explore how Creo helps drive sustainable product development practices.What You Will Learn In this eBook, you will discover how to:...

Related Resources

An Executive’s Guide to Strengthening Software Supply Chain Security

An Executive’s Guide to Strengthening Software Supply Chain Security

Modern software is assembled from a complex web of components, contributors, and tools, both internal and external. While this modularity accelerates development, it also expands the attack surface. For executives, a single breach in the software supply chain can...

M&A Software Due Diligence Checklist

M&A Software Due Diligence Checklist

M&A transactions can pose risks, especially if you aren’t sure what to look for. Dive into this eBook to explore common security protocols as well as how Black Duck can help.What You Will Learn Explore the key areas of focus for software due diligence, including:...

Transitioning Your Engineering Calculations to Mathcad Prime 11

Transitioning Your Engineering Calculations to Mathcad Prime 11

As the world of engineering continues to evolve, so does the need for more sophisticated tools to manage complex calculations and data.  The end-of-sale of Mathcad 15 and Mathcad Prime 1.0-6.0 marks a significant shift, as PTC moves forward with its latest offering,...