You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

Introduction

Connections to source hosts, jump hosts or target systems can be routed by a Proxy.

  • Proxies are defined for file transfer protocols and connections
    • In the JADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
      • the ProxyForSFTP element is a child of the SFTPFragment
  • A Proxy configuration consists of
    • a connection to the host where the Proxy is located
    • and optionally credentials for authentication

File Transfer Protocols and Proxy Protocols

Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols. For example:

The following proxy protocols are available:

Local or remote Proxy Connection

A proxy can be installed on any host in the network and is identified by its connection parameters.

Error rendering macro 'excerpt-include'

No link could be created for 'JADE Parameter Reference - BasicConnection'.

Proxy Authentication

Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.

Error rendering macro 'excerpt-include'

No link could be created for 'JADE Parameter Reference - BasicAuthentication'.

 

 

 

 

  • No labels