<p>The <a href=”https://www.techtarget.com/searchsecurity/definition/Secure-Shell”>Secure Shell</a> protocol defines a mechanism for securely connecting to a remote host. SSH replaced <a href=”https://www.techtarget.com/searchnetworking/definition/Telnet”>Telnet</a>, the original internet application for running remote login sessions.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Over the years, SSH has become much more than a terminal emulation tool, largely due to its ability to securely route network traffic using <a href=”https://www.techtarget.com/searchnetworking/definition/port”>ports</a> and host systems defined by the user. These connections are called <i>tunnels</i> because they provide a connection through which users can transmit data securely over an unsecured network.</p>
<p>Let’s take a deeper look at SSH tunneling, including how it works and the various types of SSH tunnels, before diving into the tutorials for setting up each type of tunnel.</p>
<section class=”section main-article-chapter” data-menu-title=”What is SSH tunneling?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>What is SSH tunneling?</h2>
<p>An SSH tunnel is a secure connection between an SSH client and an SSH server. The local machine routes network traffic from an arbitrary port through the SSH connection to a specified port — usually TCP port 22 — on the remote system.</p>
<p>SSH tunnels network traffic through application ports from the localhost to a remote system or vice versa. SSH tunneling, also known as <i>SSH port forwarding</i>, enables two systems to exchange data securely through <a href=”https://www.techtarget.com/searchsecurity/feature/The-five-different-types-of-firewalls”>firewalls</a> across an intranet and the internet. It is also a critical component of cloud administration.</p>
<p>Tunneling is useful for many purposes, including the following:</p>
<ul class=”default-list”>
<li>Accessing internal web services from outside a restricted network by tunneling HTTP or HTTPS traffic through an SSH port.</li>
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: