I’m currently having problems with OpenVPN and I would like to troubleshoot remotely. I can connect to the firewall using SSH and in the past I used SSH TCP tunnels to connect to the web interface remotely. PuTTY is version 0.78 on Windows 10 (1909).
I believe I have set the SSH Access option Allow TCP Forwarding but can I verify that setting from the SSH command line? If so, how?
Does this output mean the option is not set?
Apr 11 12:43:24 wscfw sshd[31774]: refused local port forward: originator 0.0.0.0 port 0, target 192.168.10.1 port 444
Apr 11 12:43:24 wscfw last message repeated 3 times
Assuming that option is set, in PuTTY I have the tunnels set as follows:
sshd-session[19457]: refused local port forward: originator 0.0.0.0 port 0, target 192.168.0.1 port 80
unfortunately the checkbox Allow TCP forwarding is
inside sshd_config
# Do not allow any kind of forwarding (provides only low security);
# some of them might need to be re-enabled if SSH server is a jump platform
AllowTcpForwarding yes
AllowAgentForwarding no
PermitOpen any