server and uses SSH tunneling
securely manage all the systems and network devices in the
, SoL) or graphical desktop tools (VNC, RDP, HTTPS, HTTP, X11,
To set up Secure Tunnel access, the computer being accessed can be
located on the same local network
dministrator then connects to the
broadband Internet connection;
To set up the secure SSH tunnel from the Client
launch SSH client software on the
p a secure SSH tunnel from the c
a port forward connection to the target network
connected host or serial conne
the client application that will be used in
This chapter details the basic
for SSH tunneled access to network attached hosts and setting
up permitted Services and Users access (
nt with gateway, host, service and client application details
and making connections between the Client
and hosts connected to the
Comments to this Manuals