Getting a program that can't be configured for a proxy to use a proxy

Posted on 2006-04-05
Last Modified: 2010-03-19
I have an ssh tunnel to another computer that can be used as an http server etc.

I cannot configure a program to access a local port on the machine in the way you can configure say explorer for It will still try to connect to [dchp network ip]:port x [target machine]:port y

The only thing I can think of is to set my machine up as a server and get the program to connect from another machine as a client.

Will this work? Does anyone have other suggestions? The network I am on is very restrictive so I have to use ssh, yet I need to connect a debugging tool across this network that accesses port 440, and no it can't be changed to use a proxy.
Question by:jez123
    LVL 18

    Expert Comment

    usually you use the SSH to accomodate the port issue by allowing it to pickup traffic on the port the application wants to use, and then translating it to the proxy port number, at least thats what I've done while playing with VNC via SSH

    Author Comment

    Thanks for the response

    VNC can be configured to use the localhost as a server, i.e. you can set the server it wants to connect to to whereby it will connect to the proxy port.

    The legacy application I have cannot be configured in this way, instead it will try to connect to [dhcp ip address]:port x

    Accepted Solution

    Ok I figured this out, either freecap or sockscap will do it.

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    Join & Write a Comment

    Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
    Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now