Questions tagged [ssh-tunnel]

An SSH tunnel leverages the SSH protocol to transport unencrypted data through an encrypted connection.

An SSH (secure shell) tunnel provides a secure connection through which unencrypted data can be sent.

This technique can be useful for:
- Providing security for insecure network protocols.
- Hiding one's true location (ip).
- Circumventing blocked ports in firewalls.

857 questions
-2
votes
2 answers

the theory of SSH public and Private key and its application in realworld machines

there. In this question, I have a very specific one about public and private keys. So Public keys should be put on the opposite side. For example, if we have a server, the public key of the server should be put in the user's machine And the user's…
Sina M
  • 3
  • 1
-3
votes
1 answer

Can I use SSH tunnel to get around firewall?

I want to ssh to Server-A which only accepts connections on port 1234. This port is blocked on my current network's firewall. Server-B however, accepts ssh connections on standard port 22, and is able to reach Server-A via ssh on the alternate port…
1 2 3
57
58