Introduction
- Proxies are defined for file transfer protocols and connections
- Whenever a connection to a source host, jump host or target system is used this can be routed by a Proxy.
- A Proxy configuration consists of
- a connection to the host where the Proxy is located
- and optionally credentials for authentication
File Transfer Protocols and Proxy Protocols
Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols.
The following proxy protocols are available:
A file transfer protocol such as FTP, does not support use of all proxy protocols, e.g.
- FTP can be used with all Proxy protocols
- SFTP can be used with SOCKS4 and SOCKS5
Local or remote Proxy Connection
A proxy can be installed on any host in the network and is identified by its connection parameters.
- see BasicConnection
Proxy Authentication
Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.