Hi,
I am having a server in a corporate data centre who's sys admin is me.
There are some virtual machines running on it.The main server is accessible from internet via SSH.
There are some people who within the lan access the virtual machines
whose IPs on LAN are
192.168.1.1
192.168.1.2
192.168.1.3
192.168.1.4
the main machine which is a bastion host for internet has IP 192.168.1.50 and only I have access to it.
I have to give people on internet the access to the internal machines whose IP I mentioned above.I know
tunnel is a good way but the people are fairly non technical and do not want to get into a
tunnel etc jargons.So I came across a solution as explained on this link
On the gateway machine which is 192.168.1.50 in the .ssh/config file I add following
Host securehost.example.com
ProxyCommand ssh
[email protected] nc %h %p
Now my question is do I need to create separate accounts on the bastion host (gateway) to those users who can SSH to the inside machines and in each of the users .ssh/config I need to make the above entry or where exactly I put the .ssh/config on the gateway.
Also ssh
[email protected]
where user1 exists only on inside machine 192.168.1.1 and not on the gateway is that right syntax? Because the internal machines are accessilbe to outside world as
site1.example.com
site2.example.com
site3.example.com
site4.example.com
But SSH is only for example.com and only one user.So
How should I go for .ssh/config
1) What is the correct syntax for ProxyCommand on gateway's .ssh/config
should I use
ProxyCommand ssh
[email protected] nc %h %p or I should use
ProxyCommand ssh
[email protected] in nc %h %p
2) Should I create new user accounts on gateway or adding them in AllowedUsers on ssh_config is sufficient?