This unit file, if enabled on boot, will attempt to connect to a remote server and establish a reverse tunnel.
It uses StrictHostKeyChecking=accept-new
for the ssh connection, so if you want to make sure the host you're connecting to is the right one, carry out the first connection manually and check the key.
REMOTE is considered a remote server that's available over ssh
LOCAL is considered the device initiating the remote tunnel. This will likely be a device dropped behind a NAT with no option of portforwarding
To use it, copy this multiline command somewhere to edit the configs and run it as root on the device: