https://coderwall.com/p/tk_pwa/ssh-into-a-secured-host-through-a-jump-server-and-forward-ports
ssh -v -t -L 10443:localhost:20443 <jump_server> ssh -t -L 20443:localhost:443 user@<target_server>
ssh -v -t -L 9292:localhost:9292 [email protected] ssh -t -L 9292:localhost:9292 [email protected]
use -N to skip shell
ssh -T -f -N -L 31808:localhost:31808 [email protected]
https://unix.stackexchange.com/questions/46235/how-does-reverse-ssh-tunneling-work/46271#46271
ssh -f -N -T -R22222:localhost:22 [email protected]
This tells your client to establish a tunnel with a -Remote entry point. Anything that attaches to port 22222 on the far end of the tunnel will actually reach "localhost port 22", where "localhost" is from the perspective of the exit point of the tunnel (i.e. your ssh client).