What is secure tunneling?
Use secure tunneling to access devices that are deployed behind port-restricted firewalls at remote sites. You can connect to the destination device from your laptop or desktop computer as the source device by using the Amazon Web Services Cloud. The source and destination communicate by using an open source local proxy that runs on each device. The local proxy communicates with the Amazon Web Services Cloud by using an open port that is allowed by firewall, typically 443. Data that is transmitted through the tunnel is encrypted using Transported Layer Security (TLS).