Info | ||
---|---|---|
| ||
Grundszenario:
|
Introduction
JADE can establish connections that are routed over proxies.
However the type of authentication allowed and the protocol used for the 'main' connection have to be considered when selecting a proxy.
File Transfer Protocols and Proxy Protocols
The following proxy protocols are available:
Different Proxy protocols can be used for different file transfer protocols. For example:
- HTTP proxies can be used with the FTP, HTTP, HTTPS and WebDAV protocols.
- SOCKS4 proxies can be used with FTP, FTPS and SFTP protocols.
- SOCKS5 proxies can be used with FTP, FTPS and SFTP protocols.
- See the JADE Parameter Reference - Reusable Elements - Proxy for more detailed information.
Local or remote Proxy Connection and Authentication
Status | ||||
---|---|---|---|---|
|
A proxy can be installed on any host in the network and is identified by its connection parameters.
Some Proxy protocols - e.g. SOCKS5 - allow authentication credentials to be specified.
Proxies connections are all configured using BasicConnection and BasicAuthentication elements - SSHAuthentication is not possible.
Specifying Proxy Connections
Connections to source hosts, jump hosts or target systems can be routed by a Proxyproxy.
- Proxies are defined for file transfer protocols and connections:
- In the JADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
- the ProxyForSFTP element is a child of the SFTPFragment
- two separate ProtocolFragments would need to be configured if it was required to define a direct connection to a server and a connection over a proxy.
- In the JADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
- A Proxy configuration consists of:
- a connection to the host where the Proxy proxy is located
- and optionally credentials for authentication
File Transfer Protocols and Proxy Protocols
Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols. For example:
- FTP can be used with all Proxy protocols.
- SFTP can be used with SOCKS4 and SOCKS5 Proxy protocols.
- Evidence for applicable Proxy protocols is stated with the file transfer protocols in the JADE - Reference Documentation - Parameter Reference
Status colour Yellow title meaning !clear
The following proxy protocols are available:
Local or remote Proxy Connection
A proxy can be installed on any host in the network and is identified by its connection parameters.
Proxy Authentication
Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.
- , which is specified with a BasicConnection element and
- credentials for authentication (optional), specified using a BasicAuthentication element
The XML element hierarchy used to specify a proxy for - here - an SFTP connecton are:
- SFTPFragment
- BasicConnection
- SSHAuthentication
- ProxyForSFTP (optional)
- SOCKS4Proxy
- BasicConnection
- Hostname
- Port
- BasicConnection
- SOCKS5Proxy
- BasicConnection
- Hostname
- Port (optional)
- BasicAuthentication
- Account
- Password (optional)
- BasicConnection
- SOCKS4Proxy
- other optional elements
...