

This is the description of the ssh -R option from the man page: So, why not ask some one who is sitting behind the firewall to do something with which you can achieve your goal of remotely accessing the server. But you know that the same firewall will not have any problem with the connections originating from server machine. The main problem is that firewall is rejecting ssh connection that your machine is trying to establish with remote server machine. Reverse SSH provides a technique through which you can simulate a normal SSH to this remote server machine. This is a real problem for those who want to access this server machine remotely. This means that only those connections would be allowed which are initiated by the remote server machine. But, the problem arises when you try to connect to a remote server which is behind a firewall and this firewall denies any incoming connection or data transfer request that has no prior outgoing request. SSH is very good tool to access remote machine or server securely. You’ll typically do the following to connect to a remote server securely using ssh command. Using this protocol, you can do a secure remote login, secure copy from/to a remote machine etc. Reverse SSH is a technique that can be used to access systems (that are behind a firewall) from the outside world.Īs you already know SSH is a network protocol that supports cryptographic communication between network nodes.
