Blog

SSH Port Forwarding Without the Headache

April 2026 · 5 min read

SSH tunnels are incredibly useful. They're also incredibly hard to remember. Is it -L or -R? Which port goes first? NexTerm replaces the cryptic flags with a simple form.

What is SSH port forwarding?

It's a way to securely access services on a remote server that aren't exposed to the internet. Example: your database runs on port 5432 but only accepts connections from localhost. With an SSH tunnel, you can access it from your PC as if it were local.

Local forwarding

The most common type. "Forward a remote port to my local machine."

# The old way:
ssh -L 5432:localhost:5432 user@server

# In NexTerm:
→ Type: Local Forward
→ Local Port: 5432
→ Remote Host: 127.0.0.1
→ Remote Port: 5432
→ Click 'Create Tunnel'

Now localhost:5432 on your PC connects to the database on the server. Open pgAdmin, connect to localhost, done.

Remote forwarding

"Make my local service accessible from the server." Useful for webhooks, demos, or sharing a local dev server.

# The old way:
ssh -R 8080:localhost:3000 user@server

# In NexTerm:
→ Type: Remote Forward
→ Local Port: 3000
→ Remote Port: 8080
→ Click 'Create Tunnel'

Visual tunnel management

NexTerm shows all active tunnels with their status (active/error), a visual diagram of the path, and one-click destroy. No more guessing which terminal window has your tunnel running.

Real-world use cases

Access a database — forward PostgreSQL/MySQL port to localhost.

Admin panels — access a web UI that only listens on 127.0.0.1.

Development — expose your local app to a staging server for testing.

Security — access internal services without opening firewall ports.

Try it

SSH tunnels are a Pro feature in NexTerm. Connect to a server, open the Tunnels tab, fill in the form. Your first tunnel takes 10 seconds.

Try NexTerm today.

Free download. No account needed. Works in 30 seconds.

Download NexTerm