This document provides information about how to configure a PuTTY session for tunneling Telnet traffic.
Resolving The Problem
To configure a PuTTY session for tunneling Telnet traffic, do the following:
|Open PuTTY.EXE, configure your host name, and select SSH for port.|
|2||Type the name you wish to use for the saved connection. In this example it is my.test.server. Do not save this yet; we have to configure the ports for tunneling.|
|3||Click on the path to reach Tunnels (Connection > SSH >Tunnels):|
|4||In the Port forwarding section, the Source Port is the source TCP/IP address you want assigned to your local host connection. The Destination is the connection on your remote SSH machine. localhost:23 will get you a Telnet connection. Select both Local ports accept connections from other hosts and Remote ports do the same.|
|5||Click the Add button to place your tunnel configuration in the Forwarded ports window.|
|6||In the left pane, click on Session to bring up the following window. Click on the Save button:|
|7||Now you can launch your session and sign in to the secure shell. After you are signed in, you must leave this window open to keep your tunnel active.|
|8||Open IBM Personal Communications. Configure a new connection and use the parameters below:|
|9||Click on Communications, and connect. You should get the remote sign on screen of the system you are tunneling to.|
You can tunnel multiple ports if you like; however, all require that the PuTTY secure shell connection stays active for data to pass over the tunnel to the remote server.
The steps above are represented as the following command on a UNIX system:
ssh -L50000:localhost:23 my.test.server.com
The steps above are represented as the following command on the QP2TERM/QP2SHELL/QSH command line:
ssh -T -L50000:localhost:23 my.test.server.com
Was this topic helpful?
18 December 2019