Reverse Port Forwarding

On the remote computer

Create a ssh connection to the home computer and start a local ssh server listening on port 2210 on it.

 ssh -R 2210:localhost:22 homeuser@[home-ip]

add –C to activate compression

add -f -N to put the process into the background

On the home computer

Connect to the local ssh server created by the remote connection.

ssh -p 2210 remoteuser@localhost

Mac OSX SSH Tunnel

The following command creates a ssh tunnel to a remote server on OSX. Emulating a Socks 4/5 proxy on localhost:8080.

ssh -N -D 8080 user@ip-address