Alibabacloud.com offers a wide variety of articles about linux ssh port forwarding, easily find your linux ssh port forwarding information here online.
From: http://manas.tungare.name/blog/ssh-port-forwarding-on-mac-os-x/
After spending about an hour processing ing what shoshould, in theory, be a simple matter, I figured I 'd write a blog post that might one day save another soul an hour or so from his or her life. so, for good karma, basically. in the past, I have set up po
As we all know, SSH is a secure transmission protocol, which is used on many connected servers. However, in addition to this function, its tunnel forwarding function is even more attractive. The following are some of my experiences with your actual operations based on your needs and the information you find online.SSH/plinkCommand basic information:Ssh-C-f-N-g-L listen_port: DST_Host: DST_port user @ Tunnel
SSH Intranet Port Forwarding combat
Guide
As you know, SSH is a secure transport protocol that is used more on the connection server. But in fact, in addition to this feature, its tunnel forwarding function is more attractive.
If the
Practice of SSH Intranet port forwardingGuideAs we all know, SSH is a secure transmission protocol, which is used on many connected servers. However, in addition to this function, its tunnel forwarding function is even more attractive.
If the linux servers between the two In
Guide
As we all know, SSH is a secure transport protocol, which is more used in connecting servers. But in addition to this function, its tunnel forwarding function is more attractive.
If the two intranet between the Linux server need to log in with each other, or need to access a port in the intranet, wo
Work often encounter problems like the following: A port on the engine room server only allows local access, such as Monit management port 2812 Port, Dell Server management port 1311; some servers in the computer room have no public network IP address, only allowed through the intranet IP connection, such as MySQL serv
, in the peanut shell to add a map to the intranet, each add a map peanut shell will be reassigned a port, this step is to map the port on our intranet host to a different port, when the user access to provide a map port host of a port, The server transfers the request to a
Use SSH port forwarding as the proxy and run the following command:
Ssh-D 7070-n-C-o pubkeyauthentication = No
From: http://www.debian-administration.org/article/SSH_dynamic_port_forwarding_with_SOCKS
In the previous article, only the specified port of the specified server
SSH supports port forwarding.Three powerful port forwarding commands of SSH:
Quote:Ssh-C-F-n-g-l listen_port: dst_host: dst_port user @ tunnel_hostSsh-C-F-n-g-r listen_port: dst_host: dst_port user @ tunnel_hostSsh-C-F-n-g-D listen_port user @ tunnel_host
-F fork into backgr
Label: style HTTP Io ar OS for SP on Art
I. Script Functions
SSH dynamic forwarding from remote to local port
Ii. script configuration
Username user
Hostname: the IP address or domain name of your host
Port can be customized. The default port script is 9000.
In my best friend's recommendation, I watched this video:The Black Magic of SSHIn this video, we introduce some of the advanced applications of SSH, and in combination with the experience of the work, two types of questions will help us a lot in our usual work:1. Two people how to see the same terminal interface2. How to do port forwarding with a single serverShe
forwarding function of SecureCRTSECURECRT Configuration:1. Create a new session, SSH connection to database server 2, session options, port forwarding, add ... Local-to-port: Enter a number between 1024~65535 to listen for local NAVICAT requests remote-
Currently, openssh is widely used in linux.Ssh-related options: -V Show version:Ssh-V OpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014 -F Enter the password and enter the background mode (Requests ssh to go to background just before command execution .) -N Do not execute a remote command. This is useful for just for warding ports (protocol version 2 only ).) -D Socket5 proxy (Specifies a local "dynamic" application-level
Hijack SSH session injection port forwarding0x00 Preface
Yesterday, the links in A niuba group were actually suitable for leaving backdoors. They belong to the Post Exploitation stage. I have never used this method before. They are all dumpfounded and used ld_preload backdoors, after the test is passed in the actual environment, if it finds that the test is available and has more practical value, let's tak
Example application:
Intranet 192.168.1.0 HOST1 eth0:192.168.1.241 installed SECURECRTOutside the net 192.168.5.0 HOST2 eth0:192.168.5.2 eth1:192.168.1.2 eth1 with HOST1 eth0 the same intranetHOST3 eth0:192.168.5.3 eth0 installed MySQL port 3306 with HOST2 eth0 same intranet
Under normal circumstances, from the HOST1 can not directly connect HOST3 MySQL, now through the SECURECRT port
Author: Wu Ating (http://www.linuxforum.net)
One. Brief introduction:
Most people know that SSH is used to replace the R command set, which is used for encrypted remote logins, file transfers, and even encrypted
FTP (SSH2 built-in), so SSH becomes one of the most widely used services, and SSH has another very
With the function of its
Environment:A server: Nic 1:192.168.1.151 nic 2:10.10.69.10B Server: Nic 1:10.10.69.41Requirements:Access to 192.168.1.151:1521 is access to 10.10.69.41:1521Enable port forwarding:Echo 1 >/proc/sys/net/ipv4/ip_forwardEmptying the NAT tableIptables-t nat-fPort forwarding Configuration Detailed:1. Simulate the Linux forwarding
Iptables implementation of Port forwarding, port mapping and two-way access is not difficult to configure, see below:
Allow packet forwarding:
#echo 1 >/proc/sys/net/ipv4/ip_forward
Forwarding TCP 8081 to xx.xx.xx.xx:
#iptables-T nat-i prerouting-p tcp–dport 80-j dnat–to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.