Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

  • Proxies are defined for file transfer protocols and connections
    • Whenever a connection to a source host, jump host or target system is used this can be routed by a Proxy.
  • A Proxy configuration consists of
    • a connection to the host where the Proxy is located
    • and optionally credentials for authentication

...

Excerpt Include
JADE Parameter Reference - SOCKS5Proxy
JADE Parameter Reference - SOCKS5Proxy
nopaneltrue

Local or remote Proxy Connection

A proxy can be installed on any host in the network and is identified by its connection parameters.

...