SSH behind the firewall

Please note that no warranty is being made here. Even if you follow these suggestions, there’s no guarantee that crackers won’t flood your network, your systems won’t go down and your hair won’t turn green. As they say, “Your mileage may vary”. Follow at your own risk.

Typing in passwords to jump from one *nix box to another can be a real drag. Even more so when you’re on a trusted network segment and you’re using SSH (more information here) to get from one hardened server to another. So I decided to do something about it on my own network. Here are the assumptions and requirements.

Read more of this post