Recently, I debugged the public account function. when receiving the push, I didn't want to submit it to the server to view the log every time. so I used the reverse proxy of Nginx to forward the requests received by Port 80 on the server to 127.0.0.1: 9000 and then use ssh to build a tunnel to set the server's 9000... I recently debugged the public account funct
0. PrefaceNC is a good tool for both ends of the network connection, but also a temporary port forwarding. (What is the permanent port forwarding?) With Iptables)SSH is also a good tool in this area, the advantage is that encryption is reliable reusable at one end of the operation, at the cost of having a login account.We know that SSH automatically encrypts and decrypts all network data between the
Recently debug public number function, do not want to submit to the server every time to read the log
So on the server with the Nginx reverse proxy to the server 80 port received the request forwarded to the 127.0.0.1:9000
Then using SSH to tunnel the server 9000 port mapped to my local development machine 80
SSH
External network access test machine.The Windows machine uses SSH to reverse tunnel. Service side using reverse proxy
Install Openssh-win and set environment variables under win
Open cmdC:\users\administrator>ssh-p 22-r 1999:localhost:8080-b 0.0.0.0 [email protected]-R 1999 Port of the remote machine-B Ext
argument is ' 0 ', the listen port would be dynamically allocated on the server and reported to the client at run Time. When used together with-o forward the allocated port would be printed to the standard OUTPU T.
Here is a list of the options used to simply introduce:
-d [listening address] The listening port is used to connect the remote SSH to the local port to form SOCK4 or SOCK5 service, (students who use shadowsocks science should be famili
easily cross the wallUse the ssh-d command to directly proxy to the target, and the target will be automatically monitored and forwarded. Support SOCKS4 SOCKS5 agent. SSH can act as a SOCK5 proxy server here. Specify a port that is then forwarded by this port as the SOCKS proxy
the company's intranet computers.
Deeper project:
After the company's system network administrator finds this line of employee, it is necessary to write a "filter" to enhance the proxy function to prevent the establishment of such tunnel.
Idea: Write this "filter" and place it between work and proxy, that is to say, work HTTP request a: First receive our "fil
How does one access the Linux server after NAT through SSH reverse tunnel? (1)
Suppose you are running a Linux server at home, which is behind the NAT router or restricted firewall. Now, you can connect to the home server through SSH when you are not at home. How do you do this? SSH port forwarding is undoubtedly a me
Forward TunnelThe topology is as follows:650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M00/7F/A8/wKiom1coD96CeuYIAAAnPHayOLU217.png "title=" 1.png " alt= "Wkiom1cod96ceuyiaaanphayolu217.png"/>DescriptionThe client cannot access the Web server directly, and the agent can access the Web server;By creating an SSH forward tunnel on the agent, the client can access the Web server indirectly through the
Background information:
Currently, there are several data centers on the line, the speed difference between different data centers is relatively large, we generally choose an optimal data center as a VPN access point.But sometimes it is slow to access other data centers directly through the VPN, so it is temporarily resolved via SSH tunnel.
Application Scenario:
Direct access to the server Idc1-server1 q
1. Create tunnel on the server using SSHSSH 10080 -f-c-q-n [email protected]112.34. 113.35 -D: Let SSH on the specified port (1025-65536-----n:tells SSH That no command would be sent once the tunnel is up# the last specified is the SSH user and the currently established
Sometimes back to SSH tunnel, the manual use of SSH to create these is not too big a problem, but if you try to boot, write a shell script and run the script in Rc.local is not successful, the reason is not known.Later discovered autossh this thing, not only can create SSH tunnel
I just discussed it with the two heroes in the group. I will summarize it and share it with you.
Now there is an intranet machine S6 and an Internet machine S7. We need to connect from S6 back to S7.
Run
Ssh-R 4022: localhost: 22 s7
At this time, the system will log in to S7, and a 4022 tunnel port will be opened locally in S7 to access IPv6.
Then execute ssh loc
Now connected to an IDC MySQL server, due to network isolation, the need to ssh to a springboard to direct access to MySQL, and I want to use mysqlworkbench such as local clients directly connected to MySQL. The solution is to set up an SSH tunnel with the SSH command, and then Mysqlworkbench connect to the correspondi
Using ssh tunnel to connect to the mysql server, sshtunnel
Preface
In some cases, we can only know the Intranet address of the database and cannot connect to the database through the Intranet. However, we can log on to other machines on the same Intranet and these machines can access the database through the Intranet, then we can access the database through ssh
Sometimes back to SSH tunnel, the manual use of SSH to create these is not too big a problem, but if you try to boot, write a shell script and run the script in Rc.local is not successful, the reason is not known.Later discovered autossh this thing, not only can create SSH tunnel
Tags: SSH tunnel encrypted WiresharkUse the "SSH to build up" the tunnel access to other computer can make the communication encrypted and secured, tested on th E HTTP service by using the SSH tunnel access,1, use the Wireshark to
Target machine: A IP is 192.168.2.150 (intranet IP) a.xxx.x.xx (extranet IP)Springboard machine: B IP for 192.168.2.151 (intranet IP) b.xxx.xx.xx (extranet IP)The target machine is not linked directly, the task now is how to connect to the target machine.1,securecrt LinksThis method is used SSH, first linked to the springboard machine ssh a.xxx.x.xxThen from the springboard to the target machine
Navicat Mysql SSH tunnel can not use a springboard machine, for the need to log on the board of the host, his own SSH tunnel is a chicken. In fact, from the principle of analysis, there is no need to open his SSH tunnel, using the
result after the combination of the user name and password, that is, the username: Password is base64-encoded.
In fact, encoding is meaningless to security. base64 cannot be regarded as encrypted in strict sense. Currently, encryption of keys is not required in the era of information security.AlgorithmThe encoding method is more appropriate. The user name and password can be obtained immediately after such a package is captured.
HTTP/1.0 200 connection established
After receiving the rece
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.