Hi,
I am having a server in a corporate data centre who's sys admin is me.
There are some virtual machines running
on it.The main server is accessible from internet via SSH.
There are some people who within the
lan access the virtual machines
whose IPs
on LAN are
192.168.1.1
192.168.1.2
192.168.1.3
192.168.1.4
the main machine which is a bastion host for internet has IP 192.168.1.50 and only I have access to it.
I have to give people
on internet the access to the internal machines whose IP I mentioned above.I know tunnel is a good way but the people are fairly non technical and do not want to get into a tunnel etc jargons.So I came across a solution as explained
on this link
On the gateway machine which is 192.168.1.50 in the .ssh/config file I add following
Host securehost.example.com
ProxyCommand ssh
[email protected] nc %h %p
Now my question is do I need to create separate accounts
on the bastion host (gateway) to those users who can SSH to the inside machines and in each of the users .ssh/config I need to make the above entry or where exactly I put the .ssh/config
on the gateway.
Also ssh
[email protected]
where user1 exists only
on inside machine 192.168.1.1 and not
on the gateway is that right syntax? Because the internal machines are accessilbe to outside world as
site1.example.com
site2.example.com
site3.example.com
site4.example.com
But SSH is only for example.com and only one user.So
How should I go for .ssh/config
1) What is the correct syntax for ProxyCommand
on gateway's .ssh/config
should I use
ProxyCommand ssh
[email protected] nc %h %p or I should use
ProxyCommand ssh
[email protected] in nc %h %p
2) Should I create new user accounts
on gateway or adding them in AllowedUsers
on ssh_config is sufficient?