Is TCP Port Forwarding on SSH Servers a Good Idea?

0
17
Asked By TechWizard93 On

I'm curious about the general consensus among sysadmins regarding TCP port forwarding on SSH servers. Do many of you allow port forwarding when someone has access to the SSH server, particularly if that server is part of the wider internal network? I noticed that on most server distributions, TCP port forwarding seems to be enabled by default, and I'm wondering if that's a best practice.

5 Answers

Answered By NetworkNinja42 On

As a non-network specialist, I think it's crucial to limit outside access. Ideally, external users should connect through a VPN before accessing internal resources. SSH can serve a similar purpose to a VPN for secure connections.

Answered By ChillSysAdmin On

Some use cases justify port forwarding, but it should be disabled by default. It’s better to ensure you only enable it when there's a real need.

Answered By CodeNerd99 On

There's been a lot of chatter about this. Disabling it doesn't solve everything; if someone can execute commands, they can still bypass restrictions in other ways. We monitor it closely and allow it only for specific troubleshooting purposes.

Answered By SecGuru101 On

Definitely don't allow that! Most compliance standards recommend disabling TCP port forwarding for security. It's a common rule among frameworks like CIS and STIG.

Answered By AdminAce321 On

In our setup, SSH services are only active when absolutely necessary, and we avoid port forwarding unless there's a particular reason. It just minimizes risks.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.