Introduction
- Proxies are defined for file transfer protocols and connections
- Whenever a connection to a source host, jump host or target system is used this can be routed by a Proxy.
- A Proxy configuration consists of
- a connection to the host where the Proxy is located
- and optionally credentials for authentication
File Transfer Protocols and Proxy Protocols
Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols.
A file transfer protocol such as FTP, does not support use of all proxy protocols, e.g.
- FTP can be used with all Proxy protocols.
- SFTP can be used with SOCKS4 and SOCKS5 Proxy protocols.
- Evidence for applicable Proxy protocols is stated with the file transfer procotols in the JADE - Reference Documentation - Parameter Reference
The following proxy protocols are available:
HTTP Proxy
SOCKS4 Proxy
SOCKS5 Proxy
Local or remote Proxy Connection
A proxy can be installed on any host in the network and is identified by its connection parameters.
Proxy Authentication
Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.