Persistent SSH tunnel manager works as Windows system service. All your SSH tunnels become available immediatelly after Windows startup and will work even if no user logged in. Ssh tunnel manager RSTunnel (Reliable SSH Tunnel) RSTunnel (Reliable SSH Tunnel) allows you to tunnel through data between two networks in a secure and encrypted tunnel. The -f option backgrounds ssh and the remote command “sleep 10” is specified to allow an amount of time (10 seconds, in the example) to start the program which is going to use the tunnel. SSH stands for Secure Shell and is the go-to network protocol for creating a secure tunnel between two devices. This tunnel is regarded as secure and private thanks to SSH’s use of strong encryption and is used as one of the primary ways of managing servers remotely. Connect through SSH gateway (jump host) Use a gateway SSH server in order to reach your end server MobaXterm will 1. Open a SSH tunnel to your gateway SSH server 2. Use this tunnel to connect directly to the end server Note 1: if you use X11-forwarding, DISPLAY will be automatically redirected.
Sponsored Link
gSTM, the Gnome SSH Tunnel Manager, is a front-end for managing SSH-tunneled port redirects. It stores tunnel configurations in a simple XML format. The tunnels, with local and remote port redirections, can be created, deleted, modified, and individually started and stopped through one simple interface. It is useful for anyone wanting to securely access private services over an encrypted tunnel.Install Gnome SSH Tunnel Manager in Ubuntu
First you need to download the .deb package from here using the following command
wget http://kent.dl.sourceforge.net/sourceforge/gstm/gstm_1.2_i386.deb
Once you have the gstm_1.2_i386.deb package you need to install this using the following command
sudo dpkg -i gstm_1.2_i386.deb
This will complete the installation.

If you want to open this application go to Applications--->Internet--->gSTM
Once it opens you should see the following screen
If you want to add ssh tunnel you need to click on add now you should see the following screen here you need to enter the name of the tunnel and click ok
Once you click ok you can see the following screen here you need to fill all the required detailed for your host and click ok
If you want to add a port redirection you need to select add under portforwarding in the above screen
Once you click on ok you should see the following screen if you want to connect to SSH tunnel select your host and click on start it should start connecting to your host
Examples
Remote Desktop
Remote Desktop to various Windoze servers in the private LAN. Although Remote Desktop supports some degree of encryption itself and you can easily create a port-forward in your firewall. First of all you don’t want to create a port-forward for every desktop you want to reach. Second and most important, you don’t want the Remote Desktop ports open for the world to see… for obvious security reasons.
Secure POP3
If you are running a POP3 service on your *nix router/server you are probably aware of the fact POP3 is an unencrypted, plain-text protocol. Hypothetically this means any ‘man-in-the-middle’ is able to read your username, password and e-mail content. Obviously, on your private LAN this isn’t a problem, however you might want to read your mail over the internet one day…
One solution would be to install pop3s or better yet, imaps. However there is another way, without having to install additional services: an SSH tunnel.The way it works is, you connect to your router/firewall through ssh and set up a portredirect over it (ie. a tunnel). You can then connect your e-mail client to your localhost. The connection will then be redirected over the encrypted SSH connection to your POP3 service. Et voila, a secure POP3 connection.
Sponsored Link
Related posts
- Webmin Installation and Configuration in Ubuntu Linux (22)
- Upgrade Ubuntu Server 6.10 (Edgy Eft) to 7.04 (Feisty Fawn) (4)
- Update IP addresses at dynamic DNS services Using ddclient (17)
- Ubuntu 7.04 (Feisty Fawn) LAMP Server Setup (16)
- Settingup an FTP Server on Ubuntu with ProFTPD (28)
- Securing SSH Using Denyhosts (10)
- Mount a Remote Folder using SSH on Ubuntu (19)
I want to use an SSH tunnel through AWS Systems Manager to access my private VPC resources. How can I do this?
Short description
AWS Systems Manager Session Manager uses the Systems Manager infrastructure to create an SSH-like session with an instance. Session Manager tunnels real SSH connections, allowing you to tunnel to another resource within your virtual private cloud (VPC) directly from your local machine. A managed instance that you create acts as a bastion host, or gateway, to your AWS resources. The benefits of this configuration are:
- Increased Security: This configuration uses only one Amazon Elastic Compute Cloud (Amazon EC2) instance (the bastion host), and connects outbound port 443 to Systems Manager infrastructure. This allows you to use Session Manager without any inbound connections. The local resource must allow inbound traffic only from the instance acting as bastion host. Therefore, there is no need to open any inbound rule publicly.
- Ease of use: You can access resources in your private VPC directly from your local machine.
Note: For instructions to access your EC2 instances with a terminal or a single port forwarding using Systems Manager, see Setting up Session Manager.


Ssh Tunnel Manager Windows
Prerequisites
Enable SSH connections through Session Manager and make sure that SSH connection requirements are met.
Note: You must have the following installed to use the SSH feature:
1. AWS Systems Manager Agent (SSM Agent) v2.3.672.0 or newer.
2. Session Manager Plugin v1.1.23 or newer on your local machine.
3. AWS CLI v1.16.12 or newer on your local machine.
Resolution
To start the SSH tunnel using Session Manager, follow these steps:
Note: If you receive errors when running AWS CLI commands, make sure that you’re using the most recent version of the AWS CLI.
1. To start the SSH tunnel, run the following command:
2. To test access to the tunnel on the target port created in step 1, run the following command:
In the preceding example, 127.0.0.1 and localport translate to access targethost:destport.
Example Configurations
Scenario 1
Create a tunnel from your local machine to access a MySQL database running on an EC2 instance using the SSM host as a bastion host.
Resources used
instance1: An EC2 instance acting as a bastion host and managed by AWS Systems Manager.
Hostname = ec2-198-51-100-1.compute-1.amazonaws.com Instance id = i-0123456789abcdefa
instance2: An EC2 instance running MySQL Database on the default port 3306.
Hostname = ec2-198-51-100-2.compute-1.amazonaws.com
Instructions
1. From a local machine (for example, your laptop), run the SSH command to connect to instance1, using Session Manager-based SSH. This command establishes a tunnel to port 3306 on instance2, and presents it in your local machine on port 9090.
Note: In the preceding example, port 9090 is available on the local machine.
2. From the local machine, access the database using the available port used in step 1 (in this example, 9090).
Important: Any security groups, network access control list (network ACL), security rules, or third-party security software that exist on instance2 must allow traffic from instance1. In the preceding example, instance2 must allow port 3306 access from instance1.
Scenario 2
Create three tunnels over a single SSH connection from your local machine to:
- Connect to the SSH port in instance1
- Access a MySQL database in RDS instance
- Access a webserver in instance3
Resources used
Ssh Tunnel Manager Gui
instance1: An EC2 instance acting as a bastion host and managed by AWS Systems Manager.
Hostname = ec2-198-51-100-1.compute-1.amazonaws.com Instance id = i-0123456789abcdefa
RDS instance: A MySQL RDS instance located in a private subnet.
Hostname = DBinstanceidentifier.abcdefg12345.region.rds.amazonaws.com
instance3: An EC2 instance located in a private subnet
Hostname = ec2-198-51-100-3.compute-3.amazonaws.com
Instructions
1. Start the session with three tunnels using the SSH command.
Note: There are three separate tunnel invocations in the command.
Note: In the preceding example, ports 8080, 9090, and 9091 are available on the local machine.
2. Access SSH from the local machine to instance1. The local port 8080 tunnels to the SSH port (22) on instance1. The key-pair and username are for the instance you are tunneling to (instance1, in this example).
3. Access the database on RDS instance. The local port 9090 tunnels to port 3306 on RDS instance. You can use MySQL workbench, which allows you to access the DB server using the GUI, with 127.0.0.1 as hostname and 9090 as port. Or, run the following command in the shell command prompt:
Ssh Tunnel Manager Windows
4. From the local machine, to access the website on instance3, open the browser and navigate to the website.
Important: Any security groups, network ACL, security rules, or third-party security software that exist on RDS instance and instance3 must allow traffic from instance1. In the preceding example, instance3 must allow port 80 access from instance1.
Ssh Tunnel Manager
Related information

Comments are closed.