Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

  • Proxies are defined for file transfer protocols and connections
    • Whenever a connection to a source host, jump host or target system is used this can be routed by a Proxy.
  • A Proxy configuration consists of
    • a connection to the host where the Proxy is located
    • and optionally credentials for authentication

File Transfer Protocols and Proxy Protocols

Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols.

...

  • FTP can be used with all Proxy protocols
  • SFTP can be used with SOCKS4 and SOCKS5

Local or remote Proxy Connection

A proxy can be installed on any host in the network and is identified by its connection parameters.

Proxy Authentication

Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.

...