Connecting to a Port Forwarding Session
Describes how to connect to a port forwarding session.
You can view steps to connect to a port forwarding session in the following scenarios:
Connect to the SSH Server on a Compute Instance
Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the SSH server on the instance , which by default is port 22
.
- You must have the private key file of the SSH key pair that you used to create the session.
- The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
- The IP address of the bastion must be permitted to access the target resource. See Allowing Network Access From the Bastion.
You can use a port forwarding session to connect to instances that don't meet all requirements for a Managed SSH session.
If you run into any problems, see Troubleshooting Bastion.
Connect to Windows Using the Remote Desktop Protocol (RDP)
Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the RDP port on the Windows instance , which by default is port 3389
.
- You must have the private key file of the SSH key pair that you used to create the session.
- The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
- The IP address of the bastion must be permitted to access the target resource. See Allowing Network Access From the Bastion.
To create the SSH tunnel using PuTTY instead of OpenSSH (the ssh
command), see Connect to Windows using RDP and PuTTY.
To connect to a Windows instance using an RDP client and a Port Forwarding session:
If you run into any problems, see Troubleshooting Bastion.
Connect to Windows using RDP and PuTTY
Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the RDP port on the Windows instance , which by default is port 3389
.
- You must have the private key file of the SSH key pair that you used to create the session.
- The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
- The IP address of the bastion must be permitted to access the target resource. See Allowing Network Access From the Bastion.
PuTTY is an open source SSH client for Windows. You must specify a private key file that is in PuTTY's proprietary format (.ppk
). You can use the PuTTYgen tool to import and convert a key from OpenSSH format.
To connect to a Windows instance using PuTTY, an RDP client, and a Port Forwarding session:
If you run into any problems, see Troubleshooting Bastion.
Connect to an Autonomous Database for Transaction Processing and Mixed Workloads Database
Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the database port, which by default is port 1521
.
- You must have the private key file of the SSH key pair that you used to create the session.
- The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
- The IP address of the bastion must be permitted to access the target resource. See Allowing Network Access From the Bastion.
To connect to an Oracle Database using a Port Forwarding session:
If you run into any problems, see Troubleshooting Bastion.
Connect to a MySQL DB System
Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the database port, which by default is port 3306
.
- You must have the private key file of the SSH key pair that you used to create the session.
- The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
- The IP address of the bastion must be permitted to access the target resource. See Allowing Network Access From the Bastion.
To connect to a MySQL DB System using a Port Forwarding session:
If you run into any problems, see Troubleshooting Bastion.