Info | ||
---|---|---|
| ||
Grundszenario:
|
Introduction
Connections to source hosts, jump hosts or target systems can be routed by a Proxy.
...
A proxy can be installed on any host in the network and is identified by its connection parameters. Excerpt Include
Proxy Authentication
Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.
Excerpt Include