SSH Local Port Forwarding
Understanding SSH Local Port Forwarding
SSH local port forwarding allows you to create a secure tunnel between your local machine and a remote system, forwarding traffic from a local port to a destination through the SSH connection. This is useful when you need to access services on a remote network that are not directly reachable.
How It Works
An SSH connection is established between the client and the server.
The client opens a local listening port.
Traffic sent to this local port is securely forwarded through the SSH tunnel to a specified destination.
Command Syntax
To create an SSH local port forward, use the following command:
Explanation:
-N
: Prevents SSH from executing remote commands, keeping the tunnel open.-L
: Specifies local port forwarding.[LOCAL_IP:LOCAL_PORT]
: The IP and port where traffic will be received on the client machine.[TARGET_IP:TARGET_PORT]
: The destination where traffic will be forwarded.[USER]@[SSH_SERVER]
: Credentials and address of the SSH server facilitating the tunnel.
Example Use Case
Imagine you need to access an internal service running on port 445
of a remote machine, but it is only accessible from within the network. You can forward this port to your local machine like this:
Breakdown:
0.0.0.0:4242
: The port4242
on your local machine will now listen for incoming connections.172.16.50.10:445
: The traffic is forwarded to port445
on the internal network host.user@ssh-server
: SSH credentials and server address used to establish the tunnel.
Once this command is executed, any connection made to localhost:4242
on your machine is securely forwarded to 172.16.50.10:445
via the SSH tunnel.
Verifying the Tunnel
After setting up the SSH tunnel, you can check if the port is listening using:
This should show the local port as open and listening.
You can then interact with the forwarded service as if it were running locally.
Closing the Tunnel
To close the SSH tunnel, simply terminate the SSH session by pressing Ctrl+C
or running:
Last updated