How to setup SSH Tunneling to bypass a firewall
Setting up SSH Tunneling to bypass a firewall
In this era, snooping, data breaches and hacking are happening rapidly.
There is much news about the website, database, phone or any gadget getting robbed off. The database of any company is getting leaked. And there are lots of people who want to help to free his/her millions of assets.
And to give security to your identity or your database, you need to secure your browser when you are using Wi-Fi. For the main solution, you have to use VPN. VPN helps to secure your any identity from anyone. It is very effective and mostly used by the hackers all around the world.
But free VPN are not that worthy as it may show that you are secured but it may not be. IT may show a problem when you are in private networks like school or office.
But SSH Tunneling is the one after the VPN for the security. SSH Tunneling enables the user to bypass a restrictive firewall without getting caught. SSH and VPN are very similar. As you know that for using VPN, you have to connect to the VPN server and then all your traffic will be encrypted and will get routed through the server.
IT is similar with SSH but we use our local PC or a router. It acts as a server for traffic and it takes quite some times.The client side PC will to an SSH server through the 22 number port. Most of the communicatio is done through the port 22. HTTPS use port 22for the encryption.
SSH uses lots of firewalls. But sometimes there may be a problem if your manager sees your PC. Your PC wil have a traffic following through the port 22 but they will not be seeing any traffic as due to encryption.
But there is a risk, you can get caught but you can’t blame us. There is no any guarantee that this method will work. Most of the firewalls allow this as they can’t compare HTTPS packet and SSH.
There are many free SSH Tunneling available but there is a concern of security which is not very easy to trust any.
To download SSH Tunneling
- Go to the website below: http://www.freesshd.com/
- Select YES for the private keys and NO for not running FreeSSHd (system service).
- Open FreeSSHd and settings.
- Click on the users tab, and add a new user.
- And in password, select pwd stored as SHA1 # and enter your pwd you like.
- Click on the check box for Tunneling and Shell.
- And select AES(128,192,256 bits)
- Click on the SSH and Tunneling tabs and the update the options given.
- You can use PUTTY for the windows and the SSH for the Linux.
- And then enter the username and the password.
- Now, open the firewalls and click on the Advanced settings.
- Click on Inbound rules > new rules
- Select the port
- Select TCP and now enter port number 22.
- Now, select allow the connection.
- And now try to ping.
There can be a time out message which means the firewall is secured. And you can’t do anything.