Tunnelling UDP Traffic Through An SSH Connection: Difference between revisions

From MediaWiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
== Overview ==
== Overview ==
This section describes how to use '''NST''' to tunnel a '''UDP''' traffic conversation through a '''SSH''' connection. For our example we will tunnel [http://ipmitool.sourceforge.net/ IPMItool] traffic ('''UDP''' Port: 623) through  an '''SSH''' connection to a '''Sun Fire X4200''' server. Three systems are involved, 2 '''NST''' probes and the '''x4200''' server.
This section describes how to use '''NST''' to tunnel a '''UDP''' traffic conversation through a '''SSH''' connection. For our example we will tunnel [http://ipmitool.sourceforge.net/ IPMItool] traffic ('''UDP''' Port: 623) through  an '''SSH''' connection to a '''Sun Fire X4200''' server. Three systems are involved, 2 '''NST''' probes and the '''x4200''' server. Reference information was taken from: "'''[http://zarb.org/~gc/html/udp-in-ssh-tunneling.html Performing UDP tunneling through an SSH connection]'''".

Revision as of 10:56, 22 March 2007

Overview

This section describes how to use NST to tunnel a UDP traffic conversation through a SSH connection. For our example we will tunnel IPMItool traffic (UDP Port: 623) through an SSH connection to a Sun Fire X4200 server. Three systems are involved, 2 NST probes and the x4200 server. Reference information was taken from: "Performing UDP tunneling through an SSH connection".