OpenText SOCKS Client overview
OpenText™ SOCKS Client is a Windows®–certified security solution that connects to hosts across firewalls. Without requiring any changes to enterprise applications, OpenText SOCKS Client helps organizations enforce security policies and allow applications to reach legitimate external hosts through simple, centrally controlled rule-based settings. The SOCKS Client uses the SOCKS industry-standard security protocol, including SOCKS5, developed to allow computers on one network to connect to hosts on another network through a proxy.
What is a SOCKS proxy client?
Firewalls can impose severe restrictions on IP data traffic, leading to problems for software not using mainstream IP ports, such as mail and remote access protocols. Organizations require a solution that keeps firewalls effective and secure, yet still allow IP access to services behind the firewall. A SOCKS proxy client enables data traffic through a firewall while keeping organizational security standards active.
OpenText SOCKS Client features
Controls access by application, destination host or IP address, or port range, functioning as a SOCKS-based personal firewall on modern Windows 32- and 64-bit platforms.
Includes platform support
Install the proxy client on any supported version of Windows, including Windows 7, 8.1 and 10, as well as Microsoft® Windows® Server 2008 R2, 2012, 2016 and 2019.
Works as part of single sign-on to seamlessly authenticate SOCKS connections using Microsoft Active Directory or other Kerberos clients.
Offers protocol support
Works with any SOCKS v4 or v5 compliant proxy solution, includes HTTP client authentication for proxy hosts and fully supports IP v4 and v6 addressing.
Provides flexible IP access rules
Enables SOCKS forwarding based on the hostname, IP address or IP address range of the outside service for specific applications that require access.
Evenly distributes the load on SOCKS servers to provide greater reliability.
OpenText SOCKS Client benefits
Isolate from external attacks
Route all connections from internal PCs to external services to isolate corporate networks from outside attacks.
Enforce security policies
Enforce security and allow applications to reach legitimate external hosts.