Case: Matt is on vacation. But his company needs him to run payroll today. He does not want to risk accessing payroll via non-secure internet access. Matt can create a secure tunnel for his laptop to access his companies payroll website.
Case: Your company firewall blocks all internet browsing. You have received permission to access certain web sites for work, but company policy will not allow the firewall to be opened up to HTTP traffic. The company firewall is open to SSH traffic. You can create a secure tunnel to a SSH server located at home (or anywhere else that you have access) and browse the internet.
Case: Connect to your Home Computer from Anywhere and Browse the Internet You are traveling and want to Remote Desktop to your home computer. You can do this from anywhere using the GSW Business Tunnel. **Note: This example is the same configuration as D02.
Case: A local technical college wants to demonstrate how you can secure telnet with an SSH Tunnel. In the technical lab they set up a telnet connection and use a network monitoring tool to observe the data. Then as shown in this example they set up the GSW Business Tunnel and then create the Telnet connection. Now when they monitor the line the data is encrypted
Case: Access to www.craigslist.com is blocked by the company proxy filter in Headquarters. However, the company has some older office furniture for sale on craigslist. The facilities manager wants to view the ad. He knows that the training laptop on the company intranet in the guest relations building has access to the internet and is running the GSW SSH Server. The HQ7 (running the GSW Business Tunnel) creates a tunnel to the Guest Relations Laptop (GRLT) which is running the GSW SSH Server and has access to www.craigslist.com
Case: Access to www.craigslist.com is blocked by the company proxy filter at Head Quarters. However, the facilities manager needs to access craigslist to find old desks for sale in the area. His computer (Thomas) at home is running the GSW SSH Server. The developer can create a Tunnel to his home computer and then browse www.craigslist.com from HQ7.
Case: Create a secure GSW Business Tunnel to a secure SSH Server and check/send email. In this example you could be at a public Wi-Fi location, a hospital, airport, library, coffee shop or at a corporate business partners site. You can use your Business Tunnel to ensure a secure connection to a safe location to check/send email. This example requires 2 channels to be used with one Tunnel.
Case: You are a traveling and want to Remote Desktop to your work computer. You can do this from anywhere using the GSW Business Tunnel.
Case: Your company does not allow incoming connections. You can set up the GSW Business Tunnel from work so that you can browse the company intranet from home. The Web Server is on the same computer as the Business Tunnel.
Case: Your company Headquarters (HQ) does not allow incoming connections. You can set up a tunnel from HQ so an employee can browse the company intranet from a new sales branch on the server (Thomas). The GSW Business Tunnel is on HQ7, a different computer than the web server(Synology Disk Station).
Case:Your company Headquarters does not allow incoming connections. You can set up a tunnel from work (HQ7) so multiple employees can browse the company intranet from a new sales branch. The GSW Business Tunnel is on HQ7, a different computer than the web server(Synology Disk Station).
Case: Your company Headquarters does not allow incoming connections. You can set up a tunnel from work (HQ) so you can browse the company intranet from home. The GSW SSH Server and Web Server are on the same computer.
Case: Your company Headquarters does not allow incoming connections. You can set up a tunnel from work Headquarters so multiple employees can browse the company intranet from a new sales branch. The GSW Business Tunnel is on a different computer than the web server.
The Business Tunnel is an SSH tunnel that provides businesses secure access to required network services that are often risky due to non-secure locations or unavailable due to policy configurations.
The Business Tunnel is an SSH tunnel that provides businesses secure access to required network services that are often risky due to non-secure locations or unavailable due to policy configurations.
The Business Tunnel is an SSH tunnel that provides businesses secure access to required network services that are often risky due to non-secure locations or unavailable due to policy configurations.
This video shows you how to configure Port Forwarding on a public facing router to forward Business Tunnel connections to an SSH server.
This video describes what a Host Fingerprint is, how it can make authentication between a server and client more secure, and how to configure a Host Fingerprint for use with the Georgia SoftWorks Business Tunnel.
This video describes how to use key pairs to authenticate your GSW Business Tunnel.