You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Introduction

  • Proxies are defined for file transfer protocols and connections
    • Whenever a connection to a source host, jump host or target system is used this can be routed by a Proxy.
  • A Proxy configuration consists of
    • a connection to the host where the Proxy is located
    • and optionally credentials for authentication

File Transfer Protocols and Proxy Protocols

Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols.

The following proxy protocols are available:

A file transfer protocol such as FTP, does not support use of all proxy protocols, e.g.

  • FTP can be used with all Proxy protocols
  • SFTP can be used with SOCKS4 and SOCKS5

Local or remote Proxy Connection

A proxy can be installed on any host in the network and is identified by its connection parameters.

Proxy Authentication

Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.

 

 

 

 

  • No labels