You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Introduction

  • Proxies are defined for file transfer protocols and connections
    • Whenever a connection to a source host, jump host or target system is used this can be routed by a Proxy.
  • A Proxy configuration consists of
    • a connection to the host where the Proxy is located
    • and optionally credentials for authentication

File Transfer Protocols and Proxy Protocols

Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols.

A file transfer protocol such as FTP, does not support use of all proxy protocols, e.g.

  • FTP can be used with all Proxy protocols
  • SFTP can be used with SOCKS4 and SOCKS5

The following proxy protocols are available:

HTTP Proxy

Error rendering macro 'excerpt-include'

No link could be created for 'JADE Parameter Reference - HTTPProxy'.

SOCKS4 Proxy

Error rendering macro 'excerpt-include'

No link could be created for 'JADE Parameter Reference - SOCKS4Proxy'.

SOCKS5 Proxy

Error rendering macro 'excerpt-include'

No link could be created for 'JADE Parameter Reference - SOCKS5Proxy'.

Local or remote Proxy Connection

A proxy can be installed on any host in the network and is identified by its connection parameters.

Error rendering macro 'excerpt-include'

No link could be created for 'JADE Parameter Reference - BasicConnection'.

Proxy Authentication

Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.

Error rendering macro 'excerpt-include'

No link could be created for 'JADE Parameter Reference - BasicAuthentication'.

 

 

 

 

  • No labels