How to Setup SSH Tunnel with Bitvise on Windows - Complete Guide

Last updated: September 11, 2025 8 min read
Table of Contents
What is SSH Tunneling? SSH tunneling creates an encrypted connection between your computer and a remote server, allowing you to route your internet traffic securely through the tunnel. This provides enhanced privacy and can bypass network restrictions.

Prerequisites

Before setting up an SSH tunnel with Bitvise, ensure you have:

  • Windows 7, 8, 10, or 11 operating system
  • Active TorGuard account with SSH tunnel service
  • Your TorGuard SSH server details and credentials
  • Administrator access on your Windows computer
  • Firefox, Chrome, or another SOCKS5-compatible browser

Benefits of SSH Tunneling

SSH tunnels provide several advantages over standard proxy connections:

  • Military-Grade Encryption: All traffic is encrypted using SSH protocol
  • Bypass Restrictions: Overcome firewalls and content filters
  • Stealth Mode: Traffic appears as regular SSH connections
  • Port Flexibility: Use multiple ports to avoid blocking
  • Obfuscation Support: Hide SSH traffic from deep packet inspection

Step 1: Enable SSH Tunnel Service

  1. Log in to your TorGuard member area
  2. Navigate to SSH Tunnel Settings
  3. Enable SSH tunnel service for your desired location
  4. Note down the following information:
    • SSH server IP address
    • Available ports (typically 22, 443, or custom ports)
    • Obfuscation key (if using obfuscation)
Important: SSH tunnel service may require separate activation. Check your service status in the member area.

Step 2: Download and Install Bitvise

  1. Visit the official Bitvise website: Download Bitvise SSH Client
  2. Download the latest version for Windows
  3. Run the installer as Administrator
  4. Follow the installation wizard:
    • Accept the license agreement
    • Choose installation directory (default is fine)
    • Select "Install for all users"
    • Complete the installation
  5. Launch Bitvise SSH Client from the Start Menu

Step 3: Configure SSH Connection in Bitvise

In the Bitvise main window, configure the Login tab with your TorGuard SSH details:

Bitvise SSH client login configuration showing server and authentication settings
Bitvise Login tab configuration with TorGuard SSH server details
Setting Value
Host Your SSH server IP (from activation email)
Port 22 (default) or custom port from server list
Username Your TorGuard VPN/Proxy username
Initial method password
Password Your TorGuard VPN/Proxy password
Store encrypted password Check this for convenience

Optional: Configure Obfuscation

If you need to hide SSH traffic from deep packet inspection:

Bitvise obfuscation settings for stealth SSH connections
Obfuscation settings for enhanced stealth (optional)
  1. Click the SSH tab in Bitvise
  2. Enable Obfuscation
  3. Enter the obfuscation keyword from your SSH settings page
  4. Use the corresponding obfuscated port (not port 22)

Step 4: Configure SOCKS5 Proxy Forwarding

Click the Services tab and configure proxy forwarding:

Bitvise Services tab showing SOCKS5 proxy configuration
Services tab configuration for SOCKS5 proxy forwarding
Setting Value
SOCKS/HTTP Proxy Forwarding Enabled (check the box)
Listen interface 127.0.0.1
Listen port 1080 (or any preferred port like 443)
Server bind interface 127.0.0.1
Server bind port 0.0.0.0

Step 5: Establish SSH Connection

  1. Review all settings to ensure accuracy
  2. Click the Login button in Bitvise
  3. If this is your first connection, you'll see a host key verification dialog:
    • Click Accept and Save to store the server's key
    • This prevents man-in-the-middle attacks
  4. Wait for the connection to establish
  5. You should see "Authentication completed" in the log window
  6. The Bitvise window will minimize to the system tray
Connected! Your SSH tunnel is now active. The SOCKS5 proxy is running on localhost:1080 (or your chosen port).

Step 6: Configure Your Browser

Firefox Configuration

Firefox network settings showing proxy configuration options
Firefox network settings - accessing proxy configuration
  1. Open Firefox and go to Settings (☰ menu → Settings)
  2. Scroll down to Network Settings
  3. Click Settings... button
  4. Configure as follows:
Firefox proxy settings configured for SOCKS5 localhost connection
Firefox manual proxy configuration for SSH tunnel
  • Select Manual proxy configuration
  • SOCKS Host: 127.0.0.1
  • Port: 1080 (or your chosen port)
  • Select SOCKS v5
  • Check Proxy DNS when using SOCKS v5
  • Click OK

Chrome Configuration

For Chrome, you'll need to use a proxy extension or command-line flags:

Option 1: Using Proxy Extension

  1. Install Proxy SwitchyOmega
  2. Create new profile → Select "Proxy Profile"
  3. Protocol: SOCKS5
  4. Server: 127.0.0.1
  5. Port: 1080
  6. Apply changes and enable the profile

Option 2: Command Line

chrome.exe --proxy-server="socks5://127.0.0.1:1080"

Verifying Your Connection

After configuring your browser, verify the SSH tunnel is working:

  1. Visit TorGuard IP Check
  2. Confirm your IP shows the SSH server location
  3. Check for DNS leaks at DNS Leak Test
  4. Test browsing speed and functionality

Advanced Configuration

Multiple Port Forwarding

You can forward multiple ports through the SSH tunnel:

  1. In Bitvise Services tab, click Add
  2. Configure additional SOCKS or port forwards
  3. Use different local ports for different services

Auto-Reconnection

Enable automatic reconnection for persistent tunnels:

  1. In Bitvise, go to Options tab
  2. Enable Reconnect automatically
  3. Set reconnection delay (5-10 seconds recommended)

System-Wide Proxy

To route all Windows traffic through the tunnel:

  1. Windows Settings → Network & Internet → Proxy
  2. Manual proxy setup → Use a proxy server
  3. Address: 127.0.0.1, Port: 1080
  4. Note: Not all Windows apps respect system proxy settings

Troubleshooting Common Issues

Connection Fails

  • Check credentials: Ensure using VPN/Proxy username, not website login
  • Verify server IP: Confirm SSH server is active in member area
  • Try different port: Some networks block port 22, try 443 or 80
  • Windows Firewall: Add Bitvise to firewall exceptions

Slow Connection Speed

  • Server location: Choose geographically closer servers
  • Compression: Enable compression in Bitvise SSH settings
  • Encryption: Try different cipher algorithms (AES-128 is faster)
  • Network congestion: Test at different times of day

Browser Not Using Proxy

  • Check proxy settings: Ensure correct SOCKS5 configuration
  • Browser cache: Clear cache and cookies
  • Extensions conflict: Disable VPN/proxy extensions
  • DNS over HTTPS: Disable in browser settings

Security Best Practices

  1. Use strong passwords: Enable two-factor authentication if available
  2. Keep Bitvise updated: Install security updates promptly
  3. Verify host keys: Don't ignore host key warnings
  4. Use obfuscation: In restrictive networks or countries
  5. Monitor connections: Check Bitvise activity log regularly

Alternative SSH Clients

While Bitvise is recommended, alternatives include:

  • PuTTY: Free, lightweight, but less user-friendly
  • MobaXterm: Feature-rich with X11 forwarding
  • SecureCRT: Professional tool with advanced features
  • OpenSSH: Built into Windows 10/11 (command-line)
Pro Tip: For mobile devices, consider using SSH tunnel apps like Termux (Android) or Termius (iOS) to create secure connections on the go.

Comparing SSH to Other Protocols

Feature SSH Tunnel VPN SOCKS5
Encryption Strong Strong None
Speed Fast Moderate Fastest
Compatibility App-specific System-wide App-specific
Stealth High Low Moderate

Was this article helpful?

Share:

Ready to Get Help?

Our support team is available 24/7 to assist you with any questions.