Port Forwarding
SSH Bridge supports three types of SSH port forwarding (tunneling):
Local Forwarding
Forwards a remote service to your local machine. For example, access a remote database running on port 3306 as if it were local.
Use case: Access a remote MySQL database at localhost:3306
Remote Forwarding
Opens a port on the remote server that forwards traffic back to your local machine. Useful for exposing local development servers.
Use case: Expose your local dev server (port 3000) on the remote server's port 8080
Dynamic (SOCKS Proxy)
Creates a SOCKS5 proxy through the SSH server. All traffic routed through the proxy is encrypted and appears to originate from the SSH server.
Use case: Secure browsing through a remote server
Creating a Rule
- Go to Port Forwarding in the sidebar
- Click Add Rule
- Select the type (Local, Remote, or Dynamic)
- Choose the SSH host to tunnel through
- Configure the ports and addresses
- Click Create
Starting and Stopping
Click the play/stop button next to any rule, or double-click to toggle. Active tunnels show a green status dot.