Use ssh tunnel11/4/2022 ![]() This screenshot example uses the TightVNC client: ![]() Just enter the SSH server information directly into the VNC client supporting SSH tunnels. In this case, there is no need to manually create the SSH tunnel using an SSH client such as OpenSSH or PuTTY. Some clients for unencrypted network services, such as FTP, VNC, etc., natively support connections using SSH tunnels. The alternative - use a client that natively supports SSH tunnels: Traffic will forward through the SSH tunnel to the target server. Use the local loopback address, 127.0.0.1 (see screenshot). To connect to the service on the target server, configure your client to connect to the client machine using the local listening port defined in the SSH tunnel configuration. Connecting to the service through the tunnel: Use ssh tunnel password#Enter your SSH username and password when prompted, unless you have configured your SSH server for public key authentication. The local port can be any arbitrary port not in use on the client. The option 15900:1.2.3.4:5900 specifies the local port, 15900, to be forwarded to the remote port, 5900, on the target server, 1.2.3.4. The following command can be used to create the SSH tunnels using the OpenSSH client: ![]() Enter your username and password for the SSH server when prompted.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |