Tunnelling UDP Traffic Through An SSH Connection: Difference between revisions

From MediaWiki
Jump to navigationJump to search
Line 5: Line 5:


== Tunnel A TCP Forward Port Through SSH ==
== Tunnel A TCP Forward Port Through SSH ==
First we need to tunnel a '''''non-used''''' '''TCP''' port from the ''local'' '''NST''' probe to the ''remote'' '''NST''' probe which shares the same LAN as the destination '''x4200''' server.
First we need to tunnel a '''''non-used''''' '''TCP''' port from the ''local'' '''NST''' probe to the ''remote'' '''NST''' probe which shares the same '''LAN''' as the destination '''x4200''' server.

Revision as of 11:03, 22 March 2007

Overview

This section describes how to use NST to tunnel a UDP traffic conversation through a SSH connection. For our example we will tunnel IPMItool traffic (UDP Port: 623) through an SSH connection to a Sun Fire X4200 server. Three systems are involved, 2 NST probes and the x4200 server. Reference information was taken from: "Performing UDP tunneling through an SSH connection".

Step By Step:

Tunnel A TCP Forward Port Through SSH

First we need to tunnel a non-used TCP port from the local NST probe to the remote NST probe which shares the same LAN as the destination x4200 server.