Using the Desktop Terminals


Local port:
Remote port:
User password:


Both Mac clients offer intuitive interfaces; both also are well-documented. For that reason, this discussion of the Mac clients is very brief. However, for both clients, the important information is the same as for the Windows clients: the hostname and ports must be correctly specified.


Two free clients for Windows provide SSH tunneling:

As with the Mac clients, the important things to keep in mind are the hostname and the port numbers. For both terminals, the configuration process is straightforward. Because TTSH is an add-on to Tera Term, it means you have to go through that one extra step before SSH functionality is possible. [A fuller description of tunneling with TTSH is being drafted and will be posted when finished. For now, please see TTSH's website.]

PuTTY, on the other hand, does not allow you to easily configure the client to handle port forwarding. As a result, it is not recommended for tunneling.

SecureCRT and F-Secure SSH

Both these clients are fairly easy to use and configure for SSH1 tunneling. The information you will need--doubtless familiar by now--is listed below.

The following illustrates the procedure; we will use SecureCRT (version 3.1.2):

  1. Open a new session, specifying "SSH1" in the pull-down menu.
  2. For "Hostname," enter ""
  3. Click on the "Advanced" button by "Hostname."
  4. Once in the Advanced section, click on the "Port Forwarding" tab.
  5. For "Local port," enter "2401."
  6. For "Remote port" enter "2401."
  7. For Username, enter "tunnel."
  8. For User password, enter "tunnel."
  9. For "Remote hostname," enter "localhost."
  10. Enter "Save" and "OK" to exit the dialog box.
  11. Back in the main connection page. . . .
  12. Leave the defaults for "Cipher" and "Authentication" as they are.
  13. Click on "Connect."
  14. The server should then prompt for your password. It is "tunnel."
  15. If this is your first time, the client will tell you that no "host key" for the server has been found and ask if you want to continue. Answer yes.
  16. You are now tunneling.
  17. The terminal screen does not show a prompt. That's how it should be. The tunnel has been established. You are now ready to begin using CVS securely.

We discuss how to use the open-source desktop Unix emulator for Windows, Cygwin, in the section titled, Tunneling using Cygwin. Because Cygwin does emulate a Unix environment, complete with many Unix commands, those who are tunneling from a Unix-like environment (say, from a Linux machine), can refer to the discussion on Cygwin.