5. SECURE TUNNEL

TUNNEL - SSH - MySQL

Note = MySQL Administrator

      Secure Connection To DataBase Server

Configuration Setup- 1

1

  Summary

  Computer networks use a tunneling protocol when one network
protocol (the delivery protocol) encapsulates a different payload protocol.
By using tunneling one can (for example) carry a payload over an incompatible
delivery-network, or provide a secure path through an untrusted network. Tunneling
typically contrasts with a layered protocol model such as those of OSI or TCP/IP.   

  The tunnel protocol usually (but not always) operates at a higher level  in the model
than does the payload protocol, or at the same level. Protocol encapsulation carried
out by conventional layered protocols, in accordance with the OSI model or TCP/IP model

2

  TUNNEL Local MySQL Adminisrator Point To Remote Databse Server

[noc@nc ~]$ ssh -f -L 3000:localhost:3306 root@mysqldata.server.net  sleep 2d
root@mysqldata.server.net 's password:


3

  Start MySQL Administrator and make connection



4

  Connected: Server is now manageable



5

  TUNNEL



6

  TUNNEL



Previous Section    SECURE TUNNEL Next Section