How to Tunnel Remote Desktop Through SSH on a Windows Computer



Similar documents
How to Use Remote Desktop over a Secure Connection (SSH)

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

Securing Windows Remote Desktop with CopSSH

OpenVPN over SSH tunneling

For paid computer support call

Access to HZB internal computers via SSH tunnel with PuTTY (Screenshots Windows 7)

Securing Windows Remote Desktop with CopSSH

F-SECURE MESSAGING SECURITY GATEWAY

UW Computer Science and Engineering Starting UNIX X Clients From Windows XP. revised September Warren Jessop

Sophos UTM. Remote Access via PPTP Configuring Remote Client

Secure Shell. The Protocol

Connecting to the School of Computing Servers and Transferring Files

Secure remote access of a private network

How to Bypass Your Corporate Firewall Using SSH Tunneling

Installing T-HUB on multiple computers

freesshd SFTP Server on Windows

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.

VHA Innovations Program Future Technology Laboratory. Linux Workstation Remote Desktop Connection Manual

Laboration 3 - Administration

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

Remote Desktop In OpenSUSE 10.3

Install and configure SSH server

How to install and use CrossTec Remote Control or SchoolVue in a Virtual and or Terminal Service environment

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to):

SSH and Basic Commands

Setting Up Scan to SMB on TaskALFA series MFP s.

1 PC to WX64 direction connection with crossover cable or hub/switch

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Installation and Connection Guide to the simulation environment GLOBAL VISION

EVault Software. Course 361 Protecting Linux and UNIX with EVault

Remote Desktop How-To. How to log into your computer remotely using Windows XP, etc.

FUJITSU Cloud IaaS Trusted Public S5 Connecting to a Virtual Machine (VM)

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

File Transfer Examples. Running commands on other computers and transferring files between computers

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

Host Installation on a Terminal Server

Aspera Connect User Guide

Connecting an Android to a FortiGate with SSL VPN

WinSCP for Windows: Using SFTP to upload files to a server

Microsoft Labs Online

Campus VPN. Version 1.0 September 22, 2008

How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)

SysAid Remote Discovery Tool

MultiSite Manager. Setup Guide

Secure surfing using Ubuntu Server, Putty, Firefox and an SSH Proxy Tunnel by

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Connecting to Remote Desktop Windows Users

Installing the SSH Client v3.2.2 For Microsoft Windows

Using Virtual Machines

Lab - Configure a Windows 7 Firewall

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Install FileZilla Client. Connecting to an FTP server

User Manual. 3CX VOIP client / Soft phone Version 6.0

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

How. to: Connect Remotely. Updated by

Quarantine Network for Specialised Equipment.

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

ShadowControl ShadowStream

There s a variety of software that can be used, but the approach described here uses freely available Cygwin software: (1) Cygwin/X (2) Cygwin/openssh

Lab Configuring Access Policies and DMZ Settings

Virtual Office Remote Installation Guide

Using Remote Web Workplace Version 1.01

Chapter 6 Virtual Private Networking Using SSL Connections

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

Endpoint Security VPN for Windows 32-bit/64-bit

How To Connect To Ecs.Org From A Pc Or Mac Or Ipad (For A Laptop) With A Network Connection (For Mac) With The Ipad Or Ipa (For Pc Or Ipac) With An Ipa Or Ip

HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation

Publishing Your Website Using MS-FTP (for Windows Users)

RemotelyAnywhere Getting Started Guide

How to Connect to Berkeley College Virtual Lab Using Windows

How to use FTP Commander

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

Global VPN Client Getting Started Guide

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

QUANTIFY INSTALLATION GUIDE

Introductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols

Installation Troubleshooting Guide

Securing Remote Desktop for Windows XP

Browser Client 2.0 Admin Guide

RealShot Manager Compression Server software

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

AlienVault. Unified Security Management 5.x Configuring a VPN Environment

Last modified on for application version 4.4.4

Global Knowledge European Remote Labs Accessing the Remote Labs portal from Windows

Remote Desktop to a BGU PC and Server for Windows Vista\7

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Accessing VirtualBox Guests from Host using SSH, WinSCP and Tunnelling

Dell One Identity Cloud Access Manager How to Configure for High Availability

Global VPN Client Getting Started Guide

Configure Backup Server for Cisco Unified Communications Manager

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Using WebVPN (webvpn.childrens.harvard.edu) to access shared and P drives, access , and use Remote Desktop

Controlling Ashly Products From a Remote PC Location

NAS 323 Using Your NAS as a VPN Server

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0

Transcription:

College of Engineering > Computing Resources > Computing Best Practices > W indows Remote Desktop How to Tunnel Remote Desktop Through SSH on a Windows Computer Why me and why now? CAE has been charged to implement the College of Engineering Network Security Policy. As part of the security measures, the College has set up a firewall, which blocks access to the College's network on certain ports. Those wishing to access their office (or lab) computer can do so via "Windows Remote Desktop", although not directly. The method described below provides a secure (encrypted via SSH) method to gain access to a remote desktop (computer) behind the College's firewall. This procedure is called tunneling. For details on how to remotely connect to a CAE Desktop, see the CAE Remote Desktop page on the CAE web site. What you need The SSH client called PuTTY which can be downloaded from http://www.chiark.greenend.org.uk/~sgtatham /putty/download.html. There is no installation routine for PuTTY as the entire program consists of the file "putty.exe" A CAE account to log into any CAE Unix computer Setting up PuTTY 1. Start PuTTY (double-click on putty.exe). You will see a window similar to this one: 1 of 7 11/24/2009 03:47 PM

2. Next, enable compression. Select SSH protocol level 2 as the default in the SSH subcategory for better security: 2 of 7 11/24/2009 03:47 PM

3. To configure the "tunneling". In the example below, we are tunneling the remote desktop port on the local machine, through the gateway to the Remote Desktop port on the fictitious remote server "remotedesktop.engr.wisc.edu" (enter the name or IP address of your computer in place of this name). The name is resolved from the remote gateway machine, so it can be a hostname not visible to the user machine. Depending on your operating system, what you enter into "Source Port" may be different from the example shown: Windows XP 127.0.0.2:3389 Other Windows Platforms: 3389 For more information on why this is necessary, see this page 3 of 7 11/24/2009 03:47 PM

The source port is the port on the user machine to which you will address connections that you intend to have tunneled. The destination defines a host and a port to which the remote gateway's sshd will connect incoming traffic from the user machine. When you click on Add, the results are displayed like this: 4 of 7 11/24/2009 03:47 PM

4. Go back to the Session subcategory, identify the gateway host's IP address or name (in the example below we used sun-10.cae.wisc.edu as the gateway, although it could be any computer with ssh allowed through the firewall), make sure that the SSH button is filled, name your session (in this case "Tunnel to my Remote Desktop") and save it: 5 of 7 11/24/2009 03:47 PM

Whenever you need the tunnel to appear, you can start PuTTY and double-click that session. Starting Remote Desktop 1. 2. 3. Start PuTTY and then click on the session that you saved earlier; this will start the SSH connection. Login to the gateway computer when prompted (in this case, the gateway computer is 'sun-10.cae.wisc.edu') and when the login process is done, you can minimze the active PuTTY session (you don't need to type anything more, but you need to keep the program running). Start your Remote Desktop program as usual. Instead of entering the name of the computer that you want to connect to, you must type in the address and port that Putty is forwarding to. Depending on your operating system, this may be different from what is shown in the example: Windows XP: 127.0.0.2 Other Windows Platforms: 127.0.0.1 This will connect you to the computer that was specified in PuTTY (in this case, the fictional computer remotedesktop.engr.wisc.edu). 6 of 7 11/24/2009 03:47 PM

4. 5. Voila! You are now connected to your Remote Desktop computer through an SSH tunnel! After you are done using Remote Desktop, exit from the program as normal and then you may close the PuTTY program. Copyright 2004 The Board of Regents of the University of Wisconsin System Date last modified: Wednesday, 10-Mar-2005 14:42:24 CDT Date created: Tuesday, 22-Jun-2004 Content by: decoster@engr.wisc.edu 7 of 7 11/24/2009 03:47 PM