

To use username and password in a file, use -auth-user-pass where is as Jesse_b proposed a file containing username on first line, password on second (/openvpn/wiki/Openvpn23ManPage). Therefore you will need to configure your internal server to use an additional TCP port such as 2222.You have two choices, one is to use a file containing username and password in clear text (not recommended) the other is using certificate authentication.

It's very likely (almost certain) that your exit server will already be listening for traffic on the standard ssh port 22. Configure the private SSH server's listening port ¶ You can then copy the output to /etc/systemd/system/rvice and enable it with systemctl enable inlets-pro. The easiest option is to run the server with the -generate=systemd flag, which will generate a systemd unit file to stdout. If using this manual approach to install inlets PRO, you should create a systemd unit file. Or if you are running SSH on a different computer to the inlets client, then you can specify a DNS entry or an IP address like 192.168.0.15. If running the inlets client on the same host as SSH, you can simply set PROXY_TO_HERE to localhost. You can use the inletsctl utility to provision exit-servers with inlets PRO preinstalled, it can also download the inlets-pro CLI. You need to know the IP of the machine you to connect to on your local network, for instance 192.168.0.35 or 127.0.0.1 if you are running inlets PRO on the same host as SSH. You can get free credits on DigitalOcean with this link.Ĭreate an API key in the DigitalOcean dashboard with Read and Write permissions, and download it to a file called do-access-token in your home directory.

You can subscribe to inlets for personal or commercial use via Gumroad Setup your tunnel server with inletsctl ¶įor this tutorial you will need to have an account and API key with one of the supported providers, or you can create an exit-server manually and install inlets PRO there yourself.įor this tutorial, the DigitalOcean provider will be used. A common scenario is connecting to a Raspberry Pi on a home network or a home-lab. Scenario: You want to allow SSH access to a computer that doesn't have a public IP, is inside a private network or behind a firewall. We'll do this by tunnelling SSH over inlets-pro, and clients will connect to your exit-server. In this tutorial we will use inlets-pro to access your computer behind NAT or a firewall. Tutorial: Expose a private SSH server over a TCP tunnel ¶
