Tunnelling Through FirewallsThis page describes various tools and techniques for tunnelling your data through firewalls. These techniques are useful primarily from the inside, weak, or "protected side" of the firewall in an attempt to get outside in some manner not directly supported by the firewall. For example, they let you get to your ProShell account with SSH even though your company/school firewall has port 22 blocked.Once you get SSH through, you can tunnel to our proxies or do whatever else you want to do. JTAN Provided Service Tunnel PortsTransparent TunnelsThese are various transparent service tunnels JTAN currently provides. Normally these are useful to puncture a firewall or a lazy router that allows certain ports to pass through, and not others. Specifically, these tunnels give you various alternatives for getting to SSH on the main JTAN ProShell machines.
Other Tunnelling ResourcesHere are some good web pages that discuss the practice of firewall puncturing. Our users have reported that some of this software is useful for tunnelling.
| ||||||||||||
Services | Resources | Contact | News | Members | Signup
|