Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Tunneling Applications

There are two types of tunnels that can be defined for application tunneling, local (outgoing) tunnels and remote (incoming) tunnels.

Local tunnels protect TCP connections that your local computer forwards from a specified local port to a specified port on the remote host computer you are connected to. It is also possible to forward the connection beyond the remote host computer, but the connection is encrypted only between SSH Tectia Client and SSH Tectia Server.

Remote tunnels protect TCP connections that a remote host forwards from a specified remote port to a specified port on your local computer.

Local Tunnel

SSH Tectia Client/Connector connects to an e-mail server within the corporate network. A local (outgoing) tunnel is created from SSH Tectia Client/Connector to SSH Tectia Server on the perimeter of the network as in Figure 4.3. The connection from SSH Tectia Server to the IMAP server is unencrypted.

Local tunnel

Figure 4.3. Local tunnel

Remote Tunnel

SSH Tectia Client also supports remote (incoming) tunnels.

X11 tunneling is a special case of remote tunneling and a built-in functionality of the product. SSH Tectia Client initiates a connection, and a remote tunnel is created for an X11 graphic connection. See Figure 4.4.

Remote tunnel for X11 connections

Figure 4.4. Remote tunnel for X11 connections


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now