13,420
edits
Changes
no edit summary
=== Investigation 6: How do you use ssh to tunnel other traffic. ===
[[Image:Tunnel.png|thumb|right|485px|You can also use an ssh connection to '''tunnel other types of traffic'''. There could be different reasons for doing this. For example tunneling traffic for an unencrypted application/protocol through ssh can '''increase the security of that application''' (i.e. deceive potential hackers). Alternatively you could use it to circumvent a firewall that is blocking traffic you wish to use but allows ssh traffic to pass through.]]
# For this section, you will still be using your '''centos1''' and '''centos2''' VMs.
# You will be working with the 2nd scenario of bypassing a firewall that blocks http traffic.