This is useful to effectively 'proxy' through (usually over multiple hops) to some secure resource which the remote host does not want accessible by any other means.
The local host, local port, password, remote port, host, port and username are mandatory fields.