Hi, I am having a server in a corporate data centre. There are some virtual machines running on it.The main server is accessible from internet via SSH. There are some people who within the lan access the virtual machines whose IPs on LAN are
Quote:
192.168.1.1
192.168.1.2
192.168.1.3
192.168.1.4
|
from internet only one host is allowed SSH.
This machine has public IP and is also connected to LAN on the IP 192.168.1.50.
Tunnel is not allowed on our network.So now I am came across a solution as explained on
this link.
I am not clear with on which machine .ssh/config file I add following
Code:
Host securehost.example.com
ProxyCommand ssh user1@insidemachine.com nc %h %p
Should above be done on gateway where public IP and ssh is allowed or client on internet who has to login.
Do I need to create separate accounts on the gateway also so that the users who can SSH to gateway then are forwarded to inside machines? Or one account on gateway is sufficient for different people logging in via internet to my gateway and then forwarded to internal machine?
Then do I need to create an account user1 on the gateway also?
1) What is the correct syntax for ProxyCommand on gateway's .ssh/config should I use
Code:
ProxyCommand ssh user1@inside.machine nc %h %p
or I should use
Code:
ProxyCommand ssh user1@gateway.com in nc %h %p
2) Should I create new user accounts on gateway also which exist on internal machine?