Jump Server

Learn how a jump server works to limit employees' access to the production system in an organization.

We'll cover the following


The use of jump servers allows an organization to limit access to production systems. A jump server can also serve as the only way to provide limited access from an internal network segment to a more exposed network segment or zone, such as a DMZThis is a demilitarized zone, which is a segment of a network that sits between an internal (trusted) network and a segment that hosts internet-facing servers. This helps protect internal resources from internet-based attacks.. Proper implementation requires locking down the network and production systems so that the jump servers are the only interface available to access them. A jump server can provide several features, such as:

  • Blocking users from administrative access to production systems.
  • Logging commands executed by a user.
  • Limiting what commands a user can execute.

How it works

A user first logs on to a jump server. Once logged on, the user can then gain access (or jump) to one of the production systems the jump server has access to. Because all commands issued by the user are first sent to the jump server, this server can filter commands so that only certain ones are passed to the production system.

Every command that the user executes can also be logged for analysis and can generate alerts. An example of an action that may generate an alert is when a user attempts to add a new account to a production system, indicating a breach of policy or something more malicious.

Get hands-on with 1200+ tech skills courses.