![]() ![]() For example the name of the machine you want to connect (in this case ). Type a name in the Saved Sessions field under which you want to save this configuration. Saving the Session Return to the Session category and fill in the Host Name of the gateway at DESY you want to log in – please always and only use – and make sure that the protocol is SSH. Port 3389 is used for remote desktop connections.Īfter clicking Add, your PuTTY configuration should look like this: You have to write down the hostname (in this case ) followed by a colon and the port number. The destination defines a host and a port to which you want to connect. ![]() You may choose any other port in between 1024 - 65535. It is chosen, because it is a port that no special application uses. This port does not have a special meaning. ![]() In this example the port number 1024 is selected. The source port is the port on the user machine to which you will address connections that you intend to have tunnelled. Here you have to insert the remote port you want to forward to a local port at your PC. Tunneling/Port Forwarding Now change to Tunnels. The dialog window is separated into two parts: on the left side you can see the categories and on the right side you can adjust the options for the selected category.įirst, select the subcategory SSH and Enable compression. Please go to the PuTTY-homepage and download the putty.exe from there: Ĭonfiguring PuTTY Open PuTTY. Then you now have static IPs per connecting user.RDP via SSH Tunnel With PuTTY First of all you need PuTTY. So your next available client IP would be 192.168.100.6 and so on. ![]() The IP address MUST be suitable for a /30 subnet (see ), as there is only 2 addresses available (server and client) per connection. Then build a key per user who is going to connect, and create the config file in the ccd dir. Ifconfig-pool-persist /etc/openvpn/ipp.txtĬlient-config-dir /etc/openvpn/ccd/client_server Pkcs12 /etc/openvpn/easy-rsa/keys/server.p12 Then create a new file /etc/openvpn/client_nf and put the following in it, changing the SERVER_IP_ADDRESS as appropriate local SERVER_IP_ADDRESS Openssl pkcs12 -export -out server.p12 -inkey server.key -in server.crt -certfile ca.crt apt-get install openvpnĬp /usr/share/doc/openvpn/examples/easy-rsa/2.0/* /etc/openvpn/easy-rsa Just configure the intermediary to be the host, and the guests can dial in and still communicate with each other. Here is a sample config and some links to guide your through the certificate creation process. Fortunately, I'm able to create a SSH tunnel from the Linux machine to the PC ssh 3389:localhost:3389 a VPN be more appropriate? OpenVPN is super simple to configure. Since Windows Firewall has a rule to allow all connections on port 3389, I have no idea what is blocking it. Update: As pointed out by I'm not able to run telnet PC 3389 from the Linux server directly. Does anybody have any idea what I'm doing wrong? I also tried to use different ports than 60666, but nothing changed. I tried the same setup with a Windows XP laptop and I'm experiencing the same symptoms. It doesn't disconnect, it doesn't provide any error and I'm not able to perform any actions in the Remote Desktop screen. It asks for my username and password, I click OK and it locks my current session on the laptop (so I see the welcome screen on the laptop instead of my desktop), it shows the "Welcome" message in the Remote Desktop screen and then it just goes black. I try to connect Remote Desktop from the PC to the laptop: localhost:60666. I SSH to the Linux sever and I run telnet localhost 60666 and it seems to produce the expected output, as described in the debugging tips that I received here. I use Putty on the PC to create a regular tunnel from it to the Linux server: L60666 localhost:60666. I use Putty on the laptop to create a reverse tunnel from it to the Linux server: R60666 localhost:3389. Windows 7 laptop, at home, on which I wish to do Remote Desktop from the PC.Public access Linux server, which has access to the PC.Windows 7 PC in a private network, sitting behind a firewall.Now, I'm trying to do the same, using the same machines, but in reverse order. I asked previously how to configure 2 SSH tunnels using an intermediary server in order to run Remote Desktop through them and I managed to make it work. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |