Using The Ssh Client To Create A Port Forwarding Daemon - HP NonStop SSH 544701-014 Reference Manual

Table of Contents

Advertisement

/home/burgt
$TB TBSSH79 9> run ssh -S $TBS79 burgt@10.0.0.12 pwd
comForte SSH client version T9999H06_16Apr2008_comForte_SSH_0079
/home/burgt
$TB TBSSH79 10>
Note that the password for the remote system is stored after the first issuing of the command and that the next time
entering the password is no longer needed.

Using the SSH client to create a port forwarding daemon

The following example shows how to use port forwarding to tunnel a Telnet session between two NonStop systems
through SSH to encrypt the network traffic. It is based on the following assumptions:
An SSH2 daemon is installed on the remote NonStop system with Port forwarding allowed. That requires the
parameter ALLOWTCPFORWARDING to be set to true.
The IP address on the remote NonStop system is 10.0.0.198. A TELSERV is running on port 23 on that IP stack
A guardian user named COMF.TB exists on the remote system
The concept of port forwarding can be applied to any TCP protocol which uses a single port on the server side of the
connection.
Starting port forwarding on the client system
The following command will start a port forwarding daemon on the client system
$TB TBSSH79 13> run ssh -S $TBS79 -N -L 2323:127.0.0.1:23 comf.tb@10.0.0.198
comForte SSH client version T9999H06_16Apr2008_comForte_SSH_0079
You have no private keys in the key store.
Trying password authentication.
Enter comf.tb@10.0.0.198's password:
The client will not be active before the password is given at the prompt. The port forwarding client listens for incoming
connections on port 2323. 127.0.0.1:23 is the IP address/port of TELSERV on the remote system from the perspective of
the remote NonStop host.
Connecting to the port forwarding client with a Telnet client
The following command will direct local Telnet traffic to the port forwarding client who in turn will forward it to the
remote NonStop system:
$TB TBSSH79 2> telnet 127.0.0.1 2323
TELNET Client - T9558H01 - (10MAY07) - (IPMAAG)
Copyright Tandem Computers Incorporated 2004
Trying...Connected to 127.0.0.1.
Escape character is '^]'.
WELCOME TO NPS762A [PORT $ZTC1 #23 WINDOW $ZTN1.#PTYKFEK]
TELSERV - T9553G06 - (24FEB2006) - (IPMAEF)
Available Services:
OSS
TACL
Enter Choice>
The following log message will show up in the SSH2 log file indicating that the session was indeed forwarded over the
SSH session:
$TBS79|08Jul08 07:54:46.08|50|\NPNS01.$Z0D3: forwarding TCP connection from
127.0.0.1:5030 to 127.0.0.1:23
HP NonStop SSH Reference Manual
EXIT
SSH and SFTP Client Reference • 201

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents