SSH2 Tunnel Configuration on Ubuntu 11.04 Natty Narwhal

VPN HowTo Add comments

As promised after starting the deployment of SSH2 Tunnelling throughout our network, we will be creating new tutorials beyond the initial Windows 7 SSH2 Tunnel one.

Here we will focus on Ubuntu 11.04 Natty Narwhal but the process should be fairly similar with older releases of Ubuntu or even other Linux distributions for which the SSH2 package that we are using is available.

So let's get started!

First of all we install the gstm package (SSH tunnel manager for GNOME) through Ubuntu Software Center. This will be the software that we will use to setup the SSH2 tunnel.

Once installed we execute it and click the Add button to create a new SSH tunnel configuration. We name it i.e. TUVPN SSH2 Tunnel:

TUVPN SSH2 Tunnel Configuration Step 1

 

Now we need to input the Tunnel Properties.

In the Login area, we enter our TUVPN VPN Username.

In Host, the server that we want to establish the SSH2 Tunnel with, in this example erfurt.tuvpn.com.

And finally in Port we enter 61.

TUVPN SSH2 Tunnel Configuration Step 2

 

Without leaving the Tunnel Properties window, we now setup the Port Redirection, the true differentiator of a SSH2 Tunnel from a Typical VPN.

We click on the Add button and as redirection Type we choose Dynamic and as Port 7070.

This will basically configure our computer to listen on port 7070 locally and send any connection to this local port to our remote server (in this case Erfurt) through the encrypted SSH2 tunnel:

TUVPN SSH2 Tunnel Configuration Step 3

 

And we are done with Tunnel Properties window. It should look like this and we can click OK:

TUVPN SSH2 Tunnel Configuration Step 4

 

And we can already Start our SSH2 Tunnel! We will have to input our TUVPN VPN password:

TUVPN SSH2 Tunnel Configuration Step 5

 

If all goes fine the TUVPN SSH2 Tunnel will change to green:

TUVPN SSH2 Tunnel Configuration Step 6

 

And now nothing happens! As explained in this previous post about the differences between VPNs, SSH2 Tunnels and Proxies, all our applications will continue to access Internet through our normal Internet connection unless we configure them to use our newly created SSH2 Tunnel.

Don't worry, it is very easy! We just need to make sure that the application that we want to use through the SSH2 Tunnel support the use of SOCKS Proxies. Many do, we will publish a list soon.

As an example here we will configure Firefox to use our just established SSH2 Tunnel to the Erfurt server.

In Firefox, we just need to go to Edit -> Prefereces. Click on the Advanced tab, then Network subtab and configure the Connection Settings like this:

TUVPN SSH2 Tunnel Configuration Step 7

As we can see, we configure Firefox to use as SOCKS Host our own computer (localhost) on port 7070. So now, when we browse Internet with Firefox, our data will go through the SSH2 Tunnel to Erfurt server and reach Internet from there. Let's check it on http://whatismyipaddress.com/:

TUVPN SSH2 Tunnel Configuration Step 8

 

But hey, what happens if my SSH2 Tunnel goes down? Will any Firefox data reach Internet through my normal Internet connection?

TUVPN SSH2 Tunnel Configuration Step 9

 

No way! SSH2 Tunnels guarantee by design that if the SSH2 Tunnel goes down, no data from the applications that you have configured to use the tunnel will ever reach Internet until the tunnel is up.

This, along the fact that only applications that you configure will actually use the tunnel, are very interesting features of SSH2 Tunnels and those that take them apart from other VPN technologies and give them an extreme flexibility of use.


Get the Best VPN NOW!

One Response to “SSH2 Tunnel Configuration on Ubuntu 11.04 Natty Narwhal”

  1. Blog TUVPN.COM - TUVPN’s New VPN Protocol: SSH2 Tunnels deployment completed! Says:

    […] now we have published tutorials about how to setup and use SSH2 Tunnels for Windows 7 and Ubuntu, more will follow for other operating systems and […]

Leave a Reply

*

Get Your VPN NOW!

©2011 TUVPN.COM. All rights reserved.