
Once the VNC connection is terminated logout or exit from the ssh session and the ssh tunnel is closed. The port number will follow the display indicated (5900+display).Ī normal VNC connection should be established to the remote system. Just change it to a ":1" to use 5901 as indicated in the second ssh example. As another example, VNC session number 2 corresponds to port number 5902.) 2. This corresponds to a 'port' number of 5906. (In the examples in the links below, we assume this to be 6. On the same laptop, if I boot into Debian 9 to try to replicate the connection using: ssh -L 5901:127.0.0.
SSH VNC TUNNEL WINDOWS
Ssh -L 5901:127.0.0.2:5900 this connection is established you can switch to another terminal and startup the vncviewer with the following command: Log in to the server with your SSH client and create a new VNC session (or look up your existing session). Restart VNC service: service vncserver restart 2. Using my laptop, I am able to establish an SSH tunnel connection using PuTTY on Windows and establish a connection to vnc through localhost:5901. The command to setup the local port 5901 to route to 5900 on the remote system would look like this: For example, when vncviewer is run for display :1 it will attempt to connect to port 5901 rather than 5900 (vncviewer host:1). So open the Putty client and navigate to the SSH menu option on the left side. We also need to make the SSH tunnel that will allow us to send the VNC traffic though an encrypted SSH connection to our server. If port 5900 is already in use on the administrator system a different port could be used. Establish a secure SSH connection First step is to configure the secure connection to the server. Ssh -L 5900:127.0.0.2:5900 -L port:host:port specifies that the given port on the local administrator host is to be forwarded to the given host and port on the remote side. From a terminal run the following command: 5902 is the remote VNC session port created above.
Create a SSH tunnel to remote VNC session using the command: ssh -L 8888:127.0.0.1:5902SSH VNC TUNNEL MAC
On the administrator system a ssh connection will need to be established to the remote system. After the vncserver is running, on the Mac open the Teminal app in the Applications Utilities folder. Add ssh to the allowed services if needed. Verify your firewall settings in YaST->Security and Users->Firewall. By default the firewall is turned on and ssh is blocked. The VNC client (TightVNC) immediately tells me that the 'Connection has been gracefully. The client systems must also allow an ssh connection as we will use a ssh tunnel to secure the VNC communication. In order to access the bhyve VM via VNC from my desktop host A, I created an SSH tunnel (on desktop A): ssh -p 22 -f -N -L 5900:192.168.1.10:5900 Then I tried connecting my VNC client to localhost:5900 - unfortunately unsuccessfully. The Remote Desktop selection in the Control Center runs "vino" which is a vncserver equivalent that allows the connection to display :0 (what the user is viewing) on port 5900. It starts a session independent from the users so you do not see the users desktop.

There is also another selection for Remote Administration in YaST but it does not allow a connection to display :0. Remote systems must have the Remote Desktop feature enabled. Open the Control Center and under the System group take the selection for Remote Desktop.
