![]() |
![]() |
| Home | What's New | Products | Download | Purchase | Support | About Us | Contact |
SUPPORT > TIPS
|
|
|
|
Using a SecureCRT® Secure Shell Connection as a SOCKS ProxyAt times the need arises to access a number of devices that reside in a remote network behind a single gateway server. One solution would be to establish an SSH connection to the gateway server, and then issue another SSH connection from that server to each of the devices via the remote shell. This can be problematic and time-consuming, especially if more than two jumps are required. Fortunately, there is a better way. SecureCRT provides the ability to create an SSH connection with a special port forwarding configuration that can then be used as a SOCKS proxy to reach all machines within a remote network (behind the gateway). Using an SSH SOCKS proxy, any application that is SOCKS 4 or 5 compatible (including other sessions established with SecureCRT) will be able to have their connections forwarded through the proxy and on to the desired destination. This tip will focus on creating an SSH SOCKS proxy via a connection to a remote gateway machine, and then using other SecureCRT sessions to connect through the SSH SOCKS proxy to the remote servers that reside behind the gateway server. The graphic below illustrates such a configuration:
Configuring the "Master Session" to the Gateway ServerThe first step is to configure a "Master" session that can successfully connect via the SSH protocol to the gateway server (also known as a "jump host"). This "Master" session will need to be modified to add a dynamic port forward, essentially creating an SSH SOCKS proxy. This is done by pressing the Add button in the Connection / Port Forwarding category of the Session Options dialog for the "Master" session. The following dialog will appear:
Within the Local Port Forwarding Properties dialog (displayed above), the following settings will need to be configured:
After performing the configuration according to the pattern above, the Local Port Forwarding Properties dialog should look similar to the following:
Since this "Master" session will need to be connected and remain connected for all sessions that use the SSH SOCKS proxy, it would also be a good idea to make the following configuration changes to the "Master" session (both options are found in the main Terminal category of the Session Options dialog):
For example:
Configuring a Global Firewall/Proxy Setup in SecureCRTNow that the dynamic port forward is set up in the "Master" session, a firewall configuration will need to be created so that other SecureCRT sessions can use the SSH SOCKS proxy. This configuration can be performed by pressing the Add button in the Firewall category of the Global Options dialog. The following Firewall Properties dialog will appear:
To set up your firewall/proxy, use the configuration guidelines below: Name: Enter a name for the firewall. For example:
Gateway Firewall The Firewall Properties dialog should now look similar to the following:
After pressing the OK button on the Firewall Properties dialog, the new firewall configuration should appear in the Firewalls list within the Firewall category of the Global Options dialog, and can be used within other SecureCRT session configurations. Configure a SecureCRT "Client" Session to Connect Through the SSH SOCKS ProxyWith a firewall/proxy configured as explained in the section above, the Session Options dialog for a new or existing session should provide the new firewall (named Gateway Firewall in the example) in the category that matches the protocol being used. To elaborate, any session that is configured to connect to the machines behind the gateway server can use this firewall as the Firewall setting in the connection configuration options, as illustrated below:
When configuring a session to use the SSH SOCKS proxy, it is important to remember that host name resolution occurs on the SSH gateway server. Thus, the Hostname field will need to be specified with a value that matches how the host would be accessed directly from the gateway server. Putting Everything TogetherOnce "Master" and "Client" sessions have been created as described above, the process of connecting to a machine behind the gateway through the SSH SOCKS proxy is fairly simple:
|
|||||||||
| Products | Downloads | Purchase | Support | About Us | |
|---|---|---|---|---|---|
| VShell Server | VShell Server | Buy Direct | Evaluation | Contact | |
| SecureCRT | SecureCRT | License Pricing | Updates Policy | Press Releases | |
| SecureFX | SecureFX | About Encryption Export | FAQs | What's New | |
| VanDyke ClientPack | VanDyke ClientPack | Orders FAQ | Tips & How-Tos | Customer Stories | |
| Beta Software | Beta Software | Resellers | Forums | Secure Solutions | |
|
Site Map | Legal Notices | Privacy Policy | Refund Policy VShell, SecureCRT, SecureFX, Entunnel, CRT, and AbsoluteFTP are trademarks or registered trademarks of VanDyke Software, Inc. in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. Copyright © 1995 - VanDyke Software, Inc. All rights reserved. |
|||||