Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Defining Proxy Rules

On the Proxy Rules page, you can define proxy rules to be used for connections.

Defining proxy rules

Figure 4.7. Defining proxy rules

To add a new proxy rule:

  1. Click Add. The Proxy Rule dialog box opens.

  2. Select the Type of the rule. The type can be Direct (no proxy), Socks4, Socks5, or Http.

    Defining proxy settings

    Figure 4.8. Defining proxy settings

    For other types than direct, enter the proxy Server address and Port.

    Select also whether the proxy rules applies to Any connection or only to connections to the specified Network. In the Network field, you can enter one or more conditions delimited by commas (,). The conditions can specify IP addresses or DNS names.

    The IP address/port conditions have an address pattern and an optional port range (ip_pattern[:port_range]).

    The ip_pattern may have one of the following forms:

    • a single IP address x.x.x.x

    • an IP address range of the form x.x.x.x-y.y.y.y

    • an IP sub-network mask of the form x.x.x.x/y

    The DNS name conditions consist of a hostname which may be a regular expression containing the characters "*" and "?" and a port range (name_pattern[:port_range]).

    Click OK.

To edit a proxy rule, select a rule from the list and click Edit.

To delete a proxy rule, select a rule from the list and click Delete.

The rules are read from top down. Use the arrow button to change the order of the rules.

To use these general proxy rules with a connection profile, you must select to do so in the profile settings. See Defining Proxy Settings.


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now