Establishing an SSH Connection

User Configuration

  1. Go to Management > Users and click Add user.

  2. Enter a name (e.g., Tunnel_User) and click Save.

  3. Select the user authentication method:

    • Choose e.g. Static password from the Add authentication method dropdown.

    • Enter the password for the created user (e.g., TestPassw0rd).

    • Click Save to close the dialog.

  4. Click Save and exit.

Creating a Listener

  1. From the left menu, select Management > Listeners and click Add listener.

  2. Enter a unique name (e.g., SSH_Tunnel).

  3. Go to the Settings tab and press SSH in the Protocol field.

  4. In the Connection mode section, select Tunnel.

  5. From the Local address list, select an IP address and port (e.g., 3455).

  6. Click Save.

Note

The Keys field displays generated SSH, TLS, and Standard RDP Security keys as well as a TLS certificate required for proper operation of a “Tunnel”-type listener.

SSH Server Configuration

  1. From the left menu, select Management > Servers and click + Add server.

  2. Enter a name (e.g., SSH_Tunnel_Server).

  3. In the Settings section, choose SSH as the protocol.

  4. In the Destination section: - Choose Host, IPv4 or IPv6. - Enter the address and port (e.g., 192.168.0.100, port: 22).

  5. Click Save and exit.

Account Configuration

  1. Select Management > Accounts, then click Add account.

  2. Enter a name (e.g., Tunnel_Account).

  3. In the Settings tab, under Type, select REGULAR.

  4. In the Target section, select the SSH_Tunnel_Server.

  5. In the Credentials section: - Enter the login (e.g., admin). - Click the button in the Replace secret section, choose e.g. Password, and enter the password.

  6. Click Save, then Save and exit.

Safe Configuration

  1. Select Management > Safes, then click Add safe.

  2. Enter a name (e.g., Tunnel_Safe), click Save.

  3. In the Users tab, click Manage users and select Tunnel_User.

  4. Click Save.

  5. In the Accounts tab, click Manage accounts and select Tunnel_Account.

  6. Click Save.

  7. Select Tunnel_Account, click Manage listeners and select SSH_Tunnel.

  8. Click Save, then Save and close.

PuTTY Configuration

  1. Launch PuTTY.

  2. In the Host Name field, enter <Fudo_user>@<Fudo_IP_address>, e.g., Tunnel_User@10.0.228.184.

  3. In the Port field, enter the port of the previously created Tunnel-type listener (e.g., 3455).

../../_images/putty_general_3.png
  1. Go to the SSH tab and check Don’t start a shell or command at all.

../../_images/putty_general_2.png
  1. Go to the Tunnels tab and add a forwarded port:

    • Source port: enter the port to be forwarded (e.g., 3455).

    • Destination: enter the destination server address and port in the format <destination_server_address>:<port> (e.g., 192.168.0.100:22).

    • Click Add.

../../_images/putty_general_4.png
  1. Return to the Sessions tab and save the configuration.

../../_images/putty_general_5.png
  1. Click Open.

  2. In the displayed terminal, enter the password for the Fudo user created earlier (TestPassw0rd).

  3. The tunnel has been established.

  4. Open a new terminal window and enter the following command to connect to the server 192.168.0.100 through the tunnel:

ssh -l "<Fudo_user>#<Server_user>#<Server_address>" localhost -p <Tunnel_listener_port>

Example:

ssh -l "Tunnel_User#admin#192.168.0.100" localhost -p 3455

Connection Without PuTTY

The tunnel can also be established directly from the terminal without using PuTTY by executing the following commands:

  • Establish the SSH tunnel:

ssh -N -l <Fudo_user> <Fudo_IP> -p <Listener_port_tunnel> -L <Listener_port_tunnel>:<Server_address>:<server_port>
  • Connect via the established SSH tunnel:

ssh -l '<Fudo_user>#<server_user>#<server_address>' localhost -p <Listener_port_tunnel>

Option explanation:

  • -N: establish the SSH connection without executing remote commands or opening a shell.

  • -l: specifies the username to connect with.

  • -p: specifies the port the SSH server listens on.

You may also consider using:

  • -f: runs the SSH connection in the background, often used with -N for tunneling.

  • -n: redirects standard input (stdin) to /dev/null, useful for background tasks.

Example:

ssh -N -l Tunnel_User 10.0.228.184 -p 3455 -L 3455:192.168.0.100:22
ssh -l 'Tunnel_User#admin#192.168.0.100' localhost -p 3455

Session List View

After the connection is established, an entry for the tunnel session will appear in Management > Sessions with the following details:

  • Fudo username (also for anonymous accounts),

  • Session protocol,

  • Destination server address,

  • Account name used for the connection,

  • Safe name,

  • Session start and end time,

  • Session duration.

../../_images/5-6-tunnel-session-list.png