Connecting to an Oracle Database

User Configuration

  1. Go to Management > Users and click Add user.

  2. Enter a name (e.g., Tunnel_User) and click Save.

  3. Choose the user authentication method:

    • Select e.g. Static password from the Add authentication method dropdown.

    • Enter a password for the new user (e.g., TestPassw0rd).

    • Click Save to close the dialog.

  4. Click Save and exit.

Creating a Listener

  1. From the left menu, select Management > Listeners and click Add listener.

  2. Enter a unique name (e.g., Oracle_Tunnel).

  3. Go to the Settings tab and in the Protocol field, press SSH.

  4. In the Connection mode section, select Tunnel.

  5. From the Local address list, choose an IP and enter the port that will be used for the SSH tunnel (e.g., 5522).

  6. Click Save.

Note

The Keys field shows generated SSH, TLS, and Standard RDP Security keys and the TLS certificate required for correct operation of a “Tunnel”-type listener.

TCP Server Configuration

  1. From the left menu, select Management > Servers and click + Add server.

  2. Enter a name (e.g., Oracle_Tunnel_Server).

  3. In the Settings section, select TCP as the protocol.

  4. In the Destination section: - Select Host, IPv4 or IPv6. - Enter the Address, Mask, and Port (e.g., 192.168.0.100, mask: 32, port: 1521).

  5. Click Save and exit.

Account Configuration

Note

To configure the connection, an anonymous account type and raw session recording type are required.

  1. Select Management > Accounts, then click Add account.

  2. Enter a name (e.g., Oracle_Tunnel_Account).

  3. Set the Session recording option to raw.

  4. In the Settings tab, under Type, select ANONYMOUS.

  5. In the Target section, select the Oracle_Tunnel_Server.

  6. Click Save and exit.

Safe Configuration

  1. Select Management > Safes, then click Add safe.

  2. Enter a name (e.g., Tunnel_Safe), click Save.

  3. In the Users tab, click Manage users and select Tunnel_User.

  4. Click Save.

  5. In the Accounts tab, click Manage accounts and select Oracle_Tunnel_Account.

  6. Click Save.

  7. Select the Oracle_Tunnel_Account, click Manage listeners, and choose Oracle_Tunnel.

  8. Click Save, then Save and close.

PuTTY Configuration

  1. Launch PuTTY.

  2. In the Host Name field, enter <Fudo_user>@<Fudo_IP_address>, e.g., Tunnel_User@10.0.228.184.

  3. In the Port field, enter the port of the Tunnel-type listener created earlier (e.g., 5522).

../../_images/putty_oracle_1.png
  1. Go to the SSH tab and check Don’t start a shell or command at all.

../../_images/putty_general_2.png
  1. Go to the Tunnels tab and add a forwarded port:

    • Source port: the port you want to forward (e.g., 4455).

    • Destination: target server address and port in the format <destination_server_address>:<port> (e.g., 192.168.0.100:1521).

    • Click Add.

../../_images/putty_oracle_2.png
  1. Return to the Sessions tab, save the configuration, and click Open.

../../_images/putty_oracle_3.png
  1. Enter the password set for Tunnel_User (e.g., TestPassw0rd) and press Enter.

  2. The tunnel is established.

Connecting via Oracle Client

  1. Launch your Oracle client (e.g., Oracle SQL Developer).

  2. Click New Connection to create a new configuration.

  3. Fill in the fields:

    • Name – connection name,

    • Username and Password – database login credentials,

    • Hostnamelocalhost,

    • Port4455 (as set in PuTTY Source port),

    • Service name – the Oracle database service name (e.g., orcl).

  4. Click Connect to establish the connection to the database.

../../_images/putty_oracle_4.png

Session List View

Once the connection is established, an entry for the session established through the tunnel will appear under Management > Sessions. The following details will be visible:

  • Fudo username (also if an anonymous account was used),

  • Session protocol,

  • Destination server address,

  • Name of the account used for the connection,

  • Safe name,

  • Session start and end time,

  • Session duration.

../../_images/5-6-tunnel-session-list.png