

This article will describe one kind of static SSH tunneling, in which every communication that passes through the tunnel is forwarded to a certain destination host. This is useful for applications like MySQL where remote server access is necessary, but the application’s default means of remote access is less secure than SSH. SSH tunneling, also known as SSH port forwarding, maps a local IP and port to a remotely accessible resource, allowing local applications to make remote connections in a secure manner.

What is an SSH Tunnel?Īn SSH Tunnel provides an encrypted connection between a local computer and remote server using the SSH protocol. When you’ve finished following along, you’ll be able to begin using SSH tunneling, gaining a useful tool for your IT toolbox. In this article, we’ll walk you through the process of creating an SSH tunnel with PuTTY. This also allows you to connect to things that may be blocked locally, that your remote server has access to.

Using this software, you can relay network traffic securely from one network site to another, guarding your information against hacking and eavesdropping. SSH tunneling with PuTTY is a useful tool for encrypting your network traffic or accessing services on other networks securely.
