


SSH port forwarding is extremely convenient and flexible however, there are a few items to keep in mind. Also, the traffic between the OpenSSH client and the OpenSSH server is encrypted by the SSH protocol. With both of these features, network traffic originating from a host appears to originate from the remote OpenSSH server instead. These features can be extremely useful when working over insecure networks or around restrictive firewalls.
KASEYA SSH PROXY WINDOWS
Also used by DCOMġ43:Internet Message Access Protocol (IMAP)-management of email messagesġ52:Background File Transfer Program (BFTP)ġ53:SGMP, Simple Gateway Monitoring Protocolġ58:DMSP, Distributed Mail Service Protocolġ61:Simple Network Management Protocol (SNMP)ġ62:Simple Network Management Protocol Trap (SNMPTRAP)ġ77:X Display Manager Control Protocol (XDMCP)Ģ20:Internet Message Access Protocol (IMAP), version 3Ģ59:ESRO, Efficient Short Remote OperationsĢ64:BGMP, Border Gateway Multicast Protocolģ11:Mac OS X Server Admin (officially AppleShare IP Web administration)ģ19:Precision time protocol event messagesģ20:Precision time protocol general messagesģ23:IMMP, Internet Message Mapping Protocolģ50:MATIP-Type A, Mapping of Airline Traffic over Internet Protocolģ51:MATIP-Type B, Mapping of Airline Traffic over Internet Protocolģ70:securecast1-Outgoing packets to NAI 's servers ģ87:AURP, AppleTalk Update-based Routing Protocolģ89:Lightweight Directory Access Protocol (LDAP)Ĥ43:HTTPS (Hypertext Transfer Protocol over SSL/TLS)Ĥ44:SNPP, Simple Network Paging Protocol (RFC 1568)Ĥ45:Microsoft-DS Active Directory, Windows sharesĤ75:tcpnethaspsrv (Aladdin Knowledge Systems Hasp services, TCP/IP version)ĥ00:Internet Security Association and Key Management Protocol (ISAKMP)ĥ01:STMF, Simple Transportation Management Framework-DOT NTCIP 1101ĥ04:Citadel-multiservice protocol for dedicated clients for the Citadel groupware systemĥ14:Shell-used to execute non-interactive commands on a remote system (Remote Shell, rsh, remsh)ĥ24:NetWare Core Protocol (NCP) is used for a variety things such as access to primary NetWare server resources, Time Synchronization, etc.ĥ45:OSIsoft PI (VMS), OSISoft PI Server Client Accessĥ91:FileMaker 6.In addition to providing a secure shell on a remote server, OpenSSH allows port forwarding and can be used as a SOCKS-compliant proxy.
KASEYA SSH PROXY GENERATOR
19:Character Generator Protocol (CHARGEN)Ģ2:Secure Shell (SSH)-used for secure logins, file transfers (scp, sftp) and port forwardingĢ3:Telnet protocol-unencrypted text communicationsĢ5:Simple Mail Transfer Protocol (SMTP)-used for e-mail routing between mail serversģ4:Remote File (RF)-used to transfer files between machinesģ9:Resource Location Protocol (RLP)-used for determining the location of higher level services from hosts on a networkĤ2:nameserver, ARPA Host Name Server Protocolĥ2:XNS (Xerox Network Systems) Time Protocolĥ4:XNS (Xerox Network Systems) Clearinghouseĥ6:XNS (Xerox Network Systems) AuthenticationĦ7:Bootstrap Protocol (BOOTP) Server also used by Dynamic Host Configuration Protocol (DHCP)Ħ8:Bootstrap Protocol (BOOTP) Client also used by Dynamic Host Configuration Protocol (DHCP)ĩ0:dnsix (DoD Network Security for Information Exchange) Securit Attribute Token Mapġ02:ISO-TSAP (Transport Service Access Point) Class 0 protocolġ04:ACR/NEMA Digital Imaging and Communications in Medicineġ13:ident-Authentication Service/Identification Protocol, used by IRC servers to identify usersġ18:SQL (Structured Query Language) Servicesġ19:Network News Transfer Protocol (NNTP)-retrieval of newsgroup messagesġ23:Network Time Protocol (NTP)-used for time synchronizationġ35:Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service, used to remotely manage services including DHCP server, DNS server and WINS.
