Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info
titleSeite überarbeiten

Grundszenario:

  • Ich müß transfer via einen Proxy machen:
    • Welche Möglichkeiten gibt's?
    • Was müsste beachtet werden?

Introduction

Connections to source hosts, jump hosts or target systems can be routed by a Proxy.

...

A proxy can be installed on any host in the network and is identified by its connection parameters. Excerpt IncludeJADE Parameter Reference - BasicConnectionJADE Parameter Reference - BasicConnectionnopaneltrue

 

Proxy Authentication

Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.

Excerpt IncludeJADE Parameter Reference - BasicAuthenticationJADE Parameter Reference - BasicAuthenticationnopaneltrue