So this is
your Mac in China that you are wanting to ssh when you are not in China? If you enabled remote login on that Mac in China then it is listening on port 22, and if port 22 traffic is forwarded through that Mac's local router, then you can ssh into it.
There are a number of posts in either this forum and/or in the
networking&web forum about how to run ssh over a non-standard port (≠22) if you want/have to. I don't think that things will work out very well for you, though, if you have multiple services trying to listen on the same port, though.
The number of other posts also discuss tunneling things like unencrypted VNC and unencrypted AFP/AFS connections through ssh (giving the added benefit of being able to close the vnc and afp ports in the local router). Of course, the tunneled traffic is delivered to the correct and appropriate port when it comes out of the tunnel, so the services at the far end are not listening to port 22, they are listening to the port that they normally listen. I don't know if you could have a Timbuktu client connect to localhost on a port other than 407 or not, but if you could, you should be able to tunnel that connection through ssh to the Timbuktu session on the other end of the ssh tunnel as well. Many client applications do allow you to do that, so they are all securely tunneled through ssh, so you only need that one single port open in your router for ssh.
Personally, I really like tunneling everything through ssh because I gain comfort knowing that most eavesdroppers can't glean any intelligence from any intercepted traffic, and because I like public key authentication, which you can do with ssh, way better than username/password authentication; the former I believe to be way superior in preventing break-ins.