https://coderwall.com/p/tk_pwa/ssh-into-a-secured-host-through-a-jump-server-and-forward-ports
ssh -v -t -L 10443:localhost:20443 <jump_server> ssh -t -L 20443:localhost:443 user@<target_server>
ssh -v -t -L 9292:localhost:9292 cloud1@10.10.10.10 ssh -t -L 9292:localhost:9292 cloud10@192.168.48.110
use -N to skip shell
ssh -T -f -N -L 31808:localhost:31808 user@10.10.10.10
https://unix.stackexchange.com/questions/46235/how-does-reverse-ssh-tunneling-work/46271#46271
ssh -f -N -T -R22222:localhost:22 user@10.10.10.10
This tells your client to establish a tunnel with a -Remote entry point. Anything that attaches to port 22222 on the far end of the tunnel will actually reach "localhost port 22", where "localhost" is from the perspective of the exit point of the tunnel (i.e. your ssh client).