Users using ssh to create virtual tunnels

How do I stop users from creating virtual tunnels and chewing up loads of bandwidth??

I noticed in /etc/ssh/ there is a config file. I am not sure if this is a good place to start. There really is no way to monitor this type of activity
running "top" command? At least I haven't found a way to isolate this type of activity. re-nice a process of suspicion isn't very helpful either.

Any insight on this would be greatly appreciated.
Thanks
Dave
 
sshd_config(5)

Code:
AllowTcpForwarding
             Specifies whether TCP forwarding is permitted.  The default is
             ``yes''.  Note that disabling TCP forwarding does not improve
             security unless users are also denied shell access, as they can
             always install their own forwarders.
 
Back
Top