* Answer the Investigation 5 question in your lab log book.
=== Investigation 6: How do you use ssh to tunnel other traffic. ===
{{Admon/note | Note! | Complete this investigation on your fedora2 and fedora1 VM's.}}
Where was {{Admon/note | | You can also use an ssh connection to tunnel other types of traffic. There could be different reasons for doing this. For example tunneling traffic for an unencrypted application/protocol through ssh can increase the file saved?security of that application. Alternatively you could use it to circumvent a firewall that is blocking traffic you wish to use but allows ssh traffic to pass through.}}