Specifications
105
SSL Tunnels
SSL Tunnels allow for ad-hoc connections to be made between networked computers.
What is an SSL Tunnel?
An SSL Tunnel is simply a connection between two TCP enabled components. All of the data
transmitted over a tunnel is encrypted using the SSL protocol. This is done the same way as other
tunneling technologies.
For example, a user may wish to create a secure tunnel to a TCP/IP enabled database. First of all, an
administrator configures a new SSL tunnel that uses 63389 as its source port and
example.company.dom:3389 as the destination. The user may then activate this tunnel and then
specify localhost as the hostname and the 63389 as the port and all traffic with then be secured.
You may use the same technique for a number of different applications and protocols. A common use
of tunnels is to secure the SMTP / POP protocols used for email access. In short, anything that uses
TCP/IP client / server architecture will usually be able to be secured in this manner.
Tunnel Types
Tunnels come in two types:
• Local: A local forwarding is where the client acts as the listening device.
• Remote: A remote forward is where the client acts as the listening process. Here the roles are
reversed and it is the remote target that acts as the listener of any communication request. The
practical implication of this is that a remote user can connect to a central company networked
SSH server and use it as a go between to access another client machine within that network.
SSL Tunnels Interface
The SSL tunnels page is accessible from Management Console Resources SSL Tunnels.
The main SSL tunnels page provides information on all tunnels present within the system.
Action Icons
The action icons against each SSL tunnel performs functions on the associated tunnel, their respective
objective is detailed below:
Delete SSL Tunnel
Edit SSL Tunnel details
Execute resource (User Console)
Create a new SSL Tunnel