Seite überarbeiten
Grundszenario:
- Ich müß transfer via einen Proxy machen:
- Welche Möglichkeiten gibt's?
- Was müsste beachtet werden?
- Zusammenhänge mit Protokolen
Introduction
Connections to source hosts, jump hosts or target systems can be routed by a Proxy.
- Proxies are defined for file transfer protocols and connections
- In the JADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
- the ProxyForSFTP element is a child of the SFTPFragment
- In the JADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
- A Proxy configuration consists of
- a connection to the host where the Proxy is located
- and optionally credentials for authentication
File Transfer Protocols and Proxy Protocols
Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols. For example:
- FTP can be used with all Proxy protocols.
- SFTP can be used with SOCKS4 and SOCKS5 Proxy protocols.
- Evidence for applicable Proxy protocols is stated with the file transfer protocols in the JADE - Reference Documentation - Parameter Reference MEANING !CLEAR
The following proxy protocols are available:
Local or remote Proxy Connection
A proxy can be installed on any host in the network and is identified by its connection parameters.
Proxy Authentication
Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.