A jump server, jump host or jump box is a system on a network used to access and manage devices in a separate security zone. Wdb viewer pro. A jump server is a hardened and monitored device that spans two dissimilar security zones and provides a controlled means of access between them. The most common example is managing a host in a DMZ from trusted networks or computers.

  1. Jumpsuit
  2. Jumpstart
  3. Jump Definition Of Jump At Dictionary.com
  4. Jump Force


In the 1990s when co-location facilities became more common there was a need to provide access between dissimilar security zones. The jump server concept emerged to meet this need. The jump server would span the two networks and typically be used in conjunction with a proxy service such as SOCKS to provide access from an administrative desktop to the managed device. As SSH tunneling became common, jump servers became the de facto method of access.

Download the Jump Desktop app to your iPhone, iPad, Android, Mac or Windows device. Launch the app and sign into the same Jump Desktop account you used when setting up your computer. Then tap your computer's icon to connect! Learn more here. Apple Premium Reseller, carries all of Apple's newest products including MacBook, iMac, iPhone, iPad and Apple accessories. At JUMP, we are all about trying something new, taking risks and stepping out of your comfort zone. By doing this, we hope that people will find that one thing that they are truly passionate about. JUMP is a non-profit creative center and community gathering place. JUMP Lyrics: (Cha-ching) / Okay, let's go, nigga / (Rocco did it again) / Wait a minute, who are you? (Ayy, yo, K.i.D.) / I make it jump like, like crack in the '80s / Baby, these bitch ass. Find 194 ways to say JUMP, along with antonyms, related words, and example sentences at Thesaurus.com, the world's most trusted free thesaurus.


Jump servers are typically placed between a secure zone and a DMZ to provide transparent management of devices on the DMZ once a management session has been established. The jump server acts as a single audit point for traffic and also a single place where user accounts can be managed. A prospective administrator must log into the jump server in order to gain access to the DMZ assets and all access can be logged for later audit.


A typical configuration is a hardened Unix (or Unix-like) machine configured with SSH and a local firewall. An administrator connects to a target machine in the DMZ by making an SSH connection from the administrator's personal computer to the jump server and then using SSH forwarding to access the target machine.

Using an SSH tunnel to the target host allows the use of insecure protocols to manage servers without creating special firewall rules or exposing the traffic on the inside network.



A typical configuration is a Windows server running Remote Desktop Services that administrators connect to, this isolates the secure infrastructure from the configuration of the administrator's workstation.[1]

Security risks[edit]

A jump server is a potential risk in a network's design.[2] There are several ways of improving the security of the jump server, including:

  • Reducing the subnet size (increasing the number of subnets), and securing those VLANs using a firewall or router.
  • Using higher security authentication, such as multi-factor authentication.
  • Keeping the operating system and software on the jump server up to date.
  • Using ACLs to restrict access to only the people that require it.
  • Not allowing outbound access to the rest of the internet from the jump server.
  • Restricting which programs can be run on the jump server.
  • Enabling strong logging.


With the high level of risk that a jump server can represent, a VPN may be a suitable and higher security replacement.[3]

In 2015, a compromised jump server allowed attackers access to over 21.5 million records in one of the largest breaches of government data in the history of the United States.[4]

See also[edit]




  1. ^'Implementing Secure Administrative Hosts'. docs.microsoft.com.
  2. ^Grimes, Roger A. (July 26, 2017). ''Jump boxes' and SAWs improve security, if you set them up right'. CSO Online.
  3. ^Bhargava, Rajat (January 10, 2014). 'Is the Jump Box Obsolete?'. O'Reilly Radar.
  4. ^Koerner, Brendan (October 23, 2016). 'Inside the Cyberattack That Shocked the US Government'. Wired.

External links[edit]

Jump Definition Of Jump At Dictionary.com

  • Wimmer, Peter Kai. 'Secure Network Zones'(PDF). ATSEC Information Security. Archived from the original(PDF) on 2016-03-08.
  • Mathis, Roland (2004-09-20). 'Installation of a Secure User-Chrooted SSH Jumphost'(PDF). GIAC. Retrieved 2019-06-12.

Jump Force

Retrieved from 'https://en.wikipedia.org/w/index.php?title=Jump_server&oldid=977779811'