

Remote TCP Forwarding (Reverse SSH) to a Local Computer Now you can start the saved SSH tunnel in Putty directly from the Windows 10 taskbar.

Specify the session name in the Saved Session field and click Save

Run the Remote Desktop Connection client (mstsc.exe) and save the connection settings to the localhost-3389.rdp file: Computer: localhost:8888 You can run this tool through the WSL2 subsystem for Windows. Ssh -L 8888:192.168.1.90:3389 can use the sshpass tool to provide password automation for SSH login. To create an SSH tunnel with a remote host 192.168.1.90, run the command: Get-WindowsCapability -Online | ? Name -like 'OpenSSH.Client*' Run the following command in the PowerShell console to install the OpenSSH client on Windows 10/11 or Windows Server 2022/2019: You can use a third-party client (like Putty), but I will use the built-in SSH client on Windows. We need an SSH client for port forwarding.

The general connection diagram looks like this: In this example, we will create a local port 8888, and the connection to it will be redirected to RDP port 3389 on a remote Windows host. All connections to this port will be forwarded to the specified port on a remote server via the SSH tunnel. In this mode, you create a local TCP port on your computer. Securing RDP with the SSH Tunnel (Local TCP Forwarding)
