|
|
Line 334: |
Line 334: |
| | class="cli" | $ sudo firewall-cmd --zone=public --remove-port=55301/tcp --permanent<br>$ sudo firewall-cmd --reload | | | class="cli" | $ sudo firewall-cmd --zone=public --remove-port=55301/tcp --permanent<br>$ sudo firewall-cmd --reload |
| | {{testedon|2020-04-21|CentOS 7.7.1908}} | | | {{testedon|2020-04-21|CentOS 7.7.1908}} |
| |}
| |
|
| |
| == SSH Tunneling ==
| |
|
| |
| Say I'm trying to access 10.101.1.10 server via SSH which is behind a restrictive firewall through 64.106.170.61. The first command will map the port 50010 of the local machine to port 22 of 10.101.1.10 that is accessible from 64.106.170.61.
| |
|
| |
| {| class="wikitable" border="1" style="border-collapse:collapse"
| |
| ! style="text-align: center;"| Description
| |
| ! Command
| |
| ! Distro
| |
| |-
| |
| | Create a SSH tunnel & connect via port 50010
| |
| | class="cli" | $ ssh -L 50010:10.101.1.10:22 mhan@64.106.170.61<br>$ ssh -p 50010 127.0.0.1
| |
| |
| |
| |} | | |} |
|
| |
|