This feature allows to create and use port forwarding mode SSH tunnel sessions just like with [OpenSSH|https://www.ssh.com/academy/ssh/tunneling/example]. \\ !!Configuration steps:\\ \\ __1.) add an SSH tunnel instance on Preferences ->[Tunnels|tunnels] page, user configurable.__ Port number doesn't really matter, not used.\\ \\ [{Image src='um_sshtunnel1.jpg' width='1440' height='..' align='left' style='..' class='..' }]\\ \\ __2.) assign that tunnel instance to a user account__ in User Manager __[Tunnels|UserManagerTunnels]__ section\\ \\ [{Image src='um_sshtunnel2.jpg' width='1440' height='..' align='left' style='..' class='..' }]\\ \\ __3.) connect with openssh tunnel mode no console__\\ \\ {{{ssh -v -N -L 8888:localhost:8080 testtunnel@192.168.3.102 -oPort=2222}}}\\ \\ __where you will replace ,as per your specific settings, the IP and port numbers:__\\ ;term:definition text ;8888: is the local port number you will connect to with a browser http://127.0.0.1:8888/ \\ \\ ;localhost: is the remote forward IP or host name we tell the ssh (Crush server) to connect the tunneled port . It's a Crush loopback tunnel, we connect to the HTTP port 8080 on the same host. \\ \\ ;8080: is the remote port to tunnel to 192.168.3.102 \\ \\ ;2222, the argument of -oPort: is the Crush server's publicly accessible IP and SFTP port \\ \\ ;testtunnel: is the tunnel user (not necessarily the same user you log in by, over tunneled webinterface) \\ \\