![]() Specify the local port number in the Source port (in our example, it is 8888) 3. Run PuTTY and navigate to Connection -> SSH -> Tunnels 2. Configure your SQL tool, or command line, whatever, to connect to :5005 and see what happens. Let’s look at how to create an SSH tunnel on Windows using the popular SSH client Putty. That Linux box is now listening on TCP port 5005, and connections to that port will forward backwards over Putty to port 1433 (SQL) on Win2008. Go home and connect from your SQL Console on your Windows 7 laptop to your home Linux box, which we're now treating as your own personal hackerish server. It works from root in Linux, so it seems worth a shot. If you're running Putty as Administrator, that should work in theory. The ‘Source port’ box will now specify a port number on the server (note that most servers will not allow you to use port numbers under 1024 for this purpose). To do this, just select the ‘Remote’ radio button instead of the ‘Local’ one. You can also forward ports in the other direction: arrange for a particular port number on the server machine to be forwarded back to your PC as a connection to a service on your PC or near it. Connect to OpenVPN server over SSH Tunnel (using Putty on Windows) Linux VPS or Dedicated Server running CentOS / RHEL / Almalinux. ![]() To set up SSH tunneling, download and launch PuTTY.exe. This is the equivalent OpenSSH command if you have that on Win2008 like ssh -R 5005:127.0.0.1:1433 the putty docs: Locate the certificate file for your client-side bastion host. Run putty.exe on the server as Administrator with REMOTE port forwarding configured as part of a connection profile to your home Linux SSH server. (See also Tunnel in the manual page of sshconfig(5).) Note that this requires OpenSSH (and probably root privileges) at both ends. ![]() Using the -w or Tunnel option in the ssh client, you can create a tun device at both ends, which can be used to forward any kind of IP traffic. How about this, presuming SSH is allowed outbound: SSH (at least OpenSSH) has support for simple VPNs. Firewalls aside, you can connect from Putty or any SSH client, and port forward. Vandyke Software has a solid SSH server product for Windows Server. Your firewall sysadmin would be in control of this. Remote Desktop Server can be configured to let you choose from different internal servers from your client at home, with the proper voodoo. You say you're coming from a Windows 7 client into a Windows 2008 server and Remote Desktop is available.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |