
We'll use this port to reverse-tunnel back to ComputerA from ComputerB.
SSH COPY FROM LOCAL TO SERVER FREE
ssh -R 2222:localhost:22 where ComputerBUser is the username for the account on ComputerB being authenticated and 2222 is a free port on ComputerB. When establishing the ssh connection ComputerA -> ComputerB, do so with the -R option in the following manner. In this case, you can configure your ssh tunnel from ComputerA -> ComputerB such it can tunnel reverse connections as well. However, you may not always have access to make these kinds of changes. In this scenario, you would typically need to configure port-forwarding in the NAT firewall. To use this solution, run from ComputerB: scp /path/to/file/on/ComputerB 2: If ComputerA is behind an NAT firewall It requires you to have an ssh server (and client) installed on both ends (computerA and computerB).

This is a swift and easy solution, combining scp and ssh (scp performs a secure copy using ssh protocols).

Scenario 1: If ComputerA is not behind an NAT firewall ComputerB is a remote machine that you can access via ssh. Say you have two computers, ComputerA and ComputerB.

I'm posting a separate solution altogether to account for the situation where it may be difficult because of network structure (think NAT firewall) to simply ssh back into the local system. Nullmeta's answer is completely valid, and perhaps nullmeta will edit to provide the clarification you're looking for.
