09-13-2008
My guess it you can only ssh to server2 fron server1 due to a rule in the firewall.
You might want to try the forward from server1 to server2 and connecting with tour client to the (forwarded) port on server1.
(the forwarded port on the server may be bound to localhost, there might be an option to avoid this)
If you really can't access the port on server1 fron client, you can use two seperate ssh tunnels:
server1> ssh -L 2222:server2:1111
# Leave this one open
client> ssh -L 1111:server1:2222
This will forward port 1111 on client to port 2222 on server1, which is forwarded to port 1111 on server2.
(different port servers only as illustration)
10 More Discussions You Might Find Interesting
1. IP Networking
Hi Linux/Unix Guru,
I am setting Linux Hopping Station to another different servers.
My current config to connect to another servers is using different port to connect.
e.g
ssh -D 1080 -p 22 username@server1.com
ssh -D 1081 -p 22 username@server2.com
Now what I would like to have... (3 Replies)
Discussion started by: regmaster
3 Replies
2. IP Networking
Hi,
Is there anyone know how to make port forward? And also, how to set up DYNDNS with router? (1 Reply)
Discussion started by: eel
1 Replies
3. IP Networking
Hey foks
my problem looks like this:
Computer 1 has two network interfaces (A and B). It's connected to computer 2 via ssh using network interface A. kann I forward network interface B to computer 2, so it shows up for example in ifconfig on computer 2? how? should i use something else than... (1 Reply)
Discussion started by: smf15
1 Replies
4. IP Networking
What I want to do is to connect to a server A (connected to a public IP) and forward the FTP connexion to server B (Connected to another public IP).
CLIENT ==>Debian SERVER A===> Debian SERVER B with ProFTPD
Passive FTP uses two ports, 21 that carries the commands and any port from about... (5 Replies)
Discussion started by: PatriceVigier
5 Replies
5. Cybersecurity
Hi Guys,
My certificate in /etc/ssh is different to what is on port 22.
username@server:~$ ssh-keyscan -p 22 127.0.0.1 > /tmp/rsa.tmp
# 127.0.0.1 SSH-1.99-OpenSSH_33.33
username@server:~$ ssh-keygen -lf /tmp/rsa.tmp
1024 46:something..................... 127.0.0.1... (0 Replies)
Discussion started by: mu100
0 Replies
6. UNIX for Dummies Questions & Answers
Hi Guys,
My certificate in /etc/ssh is different to what is on port 22.
username@server:~$ ssh-keyscan -p 22 127.0.0.1 > /tmp/rsa.tmp
# 127.0.0.1 SSH-1.99-OpenSSH_33.33
username@server:~$ ssh-keygen -lf /tmp/rsa.tmp
1024 46:something..................... 127.0.0.1... (0 Replies)
Discussion started by: mu100
0 Replies
7. Ubuntu
Hi,
I am new to linux stuff. I want to use linux iptables to configure rule so that all my incoming traffic with protocol "tcp" is forwarded to the "FORWARD CHAIN". The traffic i am dealing with has destination addresss of my machine but i want to block it from coming to input chain and somehow... (0 Replies)
Discussion started by: arsipk
0 Replies
8. UNIX for Advanced & Expert Users
I've been going crazy trying to get this working. Here's the situation: we have a Solaris 10 box that connects an internal network to an external network. We're using ipf/ipnat on it. We've added a couple of new boxes to the internal network (192.168.1.100, .101) and want to be able to get to port... (1 Reply)
Discussion started by: spakov
1 Replies
9. Debian
Hello, the Nat and the forward worked on my debian server up to the reboot of machines.
The following rules*:
/sbin/iptables -t nat -A PREROUTING -p tcp -i eth2 -d xxx.xxx.xxx.xxx --dport 29070 -j DNAT --to-destination 10.0.1.7:29070
/sbin/iptables -A FORWARD -p tcp -i eth2 -o eth0 -d... (0 Replies)
Discussion started by: titoms
0 Replies
10. Red Hat
Hi all,
I can't port forward from WAN to VPN Client. VPN Client Ubuntu 18 192.168.0.16 Port 6000
VPN Gateway for LAN clients Centos 192.168.0.12
Router 192.168.0.1
I can forward to the VPN Client if VPN is not connected if I forward Port 6000 from 192.168.0.1 directly to 192.168.0.16.... (2 Replies)
Discussion started by: stinkefisch
2 Replies
LEARN ABOUT OPENSOLARIS
ssh-http-proxy-connect
ssh-http-proxy-connect(1) User Commands ssh-http-proxy-connect(1)
NAME
ssh-http-proxy-connect - Secure Shell proxy for HTTP
SYNOPSIS
/usr/lib/ssh/ssh-http-proxy-connect [-h http_proxy_host]
[-p http_proxy_port] connect_host connect_port
DESCRIPTION
A proxy command for ssh(1) that uses HTTP CONNECT. Typical use is where connections external to a network are only allowed via a proxy web
server.
OPTIONS
The following options are supported:
-h http_proxy_host Specifies the proxy web server through which to connect. Overrides the HTTPPROXY and http_proxy environment variables
if they are set.
-p http_proxy_port Specifies the port on which the proxy web server runs. If not specified, port 80 is assumed. Overrides the HTTPPROXY-
PORT and http_proxy environment variables if they are set.
OPERANDS
The following operands are supported:
http_proxy_host The host name or IP address (IPv4 or IPv6) of the proxy.
http_proxy_port The numeric port number to connect to on http_proxy_host.
connect_host The name of the remote host to which the proxy web server is to connect you.
connect_port The numeric port number of the proxy web server to connect you to on http_proxy_host.
EXAMPLES
The recommended way to use a proxy connection command is to configure the ProxyCommand in ssh_config(4) (see Example 1 and Example 2).
Example 3 shows how the proxy command can be specified on the command line when running ssh(1).
Example 1 Setting the proxy from the environment
The following example uses ssh-http-proxy-connect in ssh_config(4) when the proxy is set from the environment:
Host playtime.foo.com
ProxyCommand /usr/lib/ssh/ssh-http-proxy-connect
playtime.foo.com 22
Example 2 Overriding proxy environment variables
The following example uses ssh-http-proxy-connect in ssh_config(4) to override (or if not set) proxy environment variables:
Host playtime.foo.com
ProxyCommand /usr/lib/ssh/ssh-http-proxy-connect -h webcache
-p 8080 playtime.foo.com 22
Example 3 Using the command line
The following example uses ssh-http-proxy-connect from the ssh(1) command line:
example$ ssh -o'ProxyCommand="/usr/lib/ssh/ssh-http-proxy-connect
-h webcache -p 8080 playtime.foo.com 22"' playtime.foo.com
ENVIRONMENT VARIABLES
HTTPPROXY Takes the http_proxy_host operand to specify the default proxy host. Overrides http_proxy if both are set.
HTTPPROXYPORT Takes the http_proxy_port operand to specify the default proxy port. Ignored if HTTPPROXY is not set.
http_proxy URL format for specifying proxy host and port.
EXIT STATUS
The following exit values are returned:
0 Successful completion.
1 An error occurred.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWsshu |
+-----------------------------+-----------------------------+
|Interface Stability |Stable |
+-----------------------------+-----------------------------+
SEE ALSO
ssh(1), ssh-socks5-proxy-connect(1), ssh_config(4), attributes(5)
SunOS 5.11 24 Oct 2001 ssh-http-proxy-connect(1)