This is useful to effectively 'proxy' through (usually over multiple hops) to some secure resource which the remote host does not want accessible by any other means.
The local port, password, remote host, remote port, host, port and username are mandatory fields.