SSH Over HTTPS
This method uses HTTPS with TLS encryption to encapsulate SSH traffic. This allows SSH traffic to appear as if it's HTTPS traffic, and can be useful to bypass firewalls that block port 22 (SSH).
Firewalls with destination port 22 restriction only
$ cat /etc/ssh/sshd_config
# eg. to listen on all interfaces at port 4000
ListenAddress <listen_address>:<new_port_for_ssh_server_to_listen> $ ssh -p <new_port_for_ssh_server_to_listen> user@ssh_server_addressExample
Firewalls with destination port 22 restriction & deep packet inspection
Last updated