What happens when we run into the problem where we want to tunnel an SSH session to connect to a remote server on our local machine. Check out the solution in the video SSH Tunneling To Connect To RDP With PuTTY. As you can see in the video, I intentionally use fake servers to show examples of what you would do with the actual servers so that you can accomplish this.
Some examples we see in the video:
- What is a development caution I note that you should check upon starting this?
- What is a caution about using the PuTTY interface?
- What tool do we use initially that we'll need when setting this up?
For mastering data transformation from one form to another form, check out the highest-rated Automating ETL course on Udemy. For a coupon to the course, check out the trailer video on the channel SQL In Six Minutes.
Where would we apply this? Suppose that we want to reach Server B, but due to a firewall or a custom setup, we're unable to access Server B. If we're able to access Server A (but not Server B) and from Server A we can access Server B, then we can tunnel a connection to Server B through Server A. In other words, this looks like the following:
- Direct access to Server B: fail
- Direct access to Server A: success
- Access to Server B through Server A: success
Are you looking for tech consultants that can assist with design and development? From building custom applications to working with existing infrastructure that's causing you trouble, we can get you connected to consultants who can assist. You can contact for assistance.