Installation $ npm install -g ssh-tunnel-manager easy to use even for people not experienced with ssh.full CLI interface for intuitive configuring (no need to edit config manually).variables in remote hosts to support "dynamic" tunnels.tunnel config files in addition to global config.reconnect if the tunnel host is no reachable while tunnels are setup.multiple connection profiles (with default support).Support for variables in host names for tunnels (a feature most important to me).Detached tunnel and connection configuration (it's up to you to consider this pro or con).Easy to use on command line and still powerful in configuration.NodeJS based and runs on the common OS systems like linux,mac or windows without having more installed than node.Contributors then only need to start the tunnel manager in this directory or specify this file on startup.įirst of all when you are reading this you might came here for a reason. This is helpful for application maintainers who have the best knowledge about services used in this application. In addition to the configuration file there is also support to specify (or use a default) tunnel configuration file. As for integration system you often need to specify dynamic hostnames - SSH tunnel manager also supports this via variables. You can specify multiple connection profiles such for integration and production systems. Tunnels are managed within groups, if you only need one tunnel then the ssh command is probably better suited. Et voila, a secure POP3 connection.NodeJS based applicaton for easy managing SSH tunnels. The connection will then be redirected over the encrypted SSH connection to your POP3 service. You can then connect your e-mail client to your localhost. However there is another way, without having to install additional services: an SSH tunnel.The way it works is, you connect to your router/firewall through ssh and set up a portredirect over it (ie. One solution would be to install pop3s or better yet, imaps. Obviously, on your private LAN this isn’t a problem, however you might want to read your mail over the internet one day… Hypothetically this means any ‘man-in-the-middle’ is able to read your username, password and e-mail content. If you are running a POP3 service on your *nix router/server you are probably aware of the fact POP3 is an unencrypted, plain-text protocol. Second and most important, you don’t want the Remote Desktop ports open for the world to see… for obvious security reasons. First of all you don’t want to create a port-forward for every desktop you want to reach. Although Remote Desktop supports some degree of encryption itself and you can easily create a port-forward in your firewall. Remote Desktop to various Windoze servers in the private LAN. Once you click on ok you should see the following screen if you want to connect to SSH tunnel select your host and click on start it should start connecting to your host If you want to add a port redirection you need to select add under portforwarding in the above screen Once you click ok you can see the following screen here you need to fill all the required detailed for your host and click ok If you want to add ssh tunnel you need to click on add now you should see the following screen here you need to enter the name of the tunnel and click ok Once it opens you should see the following screen ![]() ![]() If you want to open this application go to Applications->Internet->gSTM ![]() Once you have the gstm_1.2_b package you need to install this using the following command deb package from here using the following command Install Gnome SSH Tunnel Manager in Ubuntuįirst you need to download the. ![]() It is useful for anyone wanting to securely access private services over an encrypted tunnel. The tunnels, with local and remote port redirections, can be created, deleted, modified, and individually started and stopped through one simple interface. It stores tunnel configurations in a simple XML format. GSTM, the Gnome SSH Tunnel Manager, is a front-end for managing SSH-tunneled port redirects.
0 Comments
Leave a Reply. |