Most production targets aren’t reachable directly from your laptop — they sit behind a bastion (or two, or three) on a private network. Jump host chains let you describe that path once on a host record, and Rumus handles the multi-hop dance every time you connect. The order is always: Client → [Proxy] → Jump 1 → Jump 2 → … → Target.Documentation Index
Fetch the complete documentation index at: https://www.rumus.ai/docs/llms.txt
Use this file to discover all available pages before exploring further.
Set up a chain
Jump chains live on each host record under the Host Chaining section.Add a jump host
Click Add Jump Host. A searchable list of your other saved hosts appears — pick the bastion that sits between you and the target.
Add more hops if needed
Repeat to add more jump hosts. Drag (or use the up/down arrows) to reorder them — the order is the connection order from your machine outward to the target.
Important: proxy is first-hop only
If you’ve configured a proxy on the target host, the proxy is only used for the first hop — your machine reaching Jump 1. Subsequent hops (Jump 1 → Jump 2 → Target) use the network of the previous bastion. That’s almost always what you want: bastions usually have direct LAN access to your private targets, so they don’t need a proxy. If a bastion needs its own proxy to reach the next hop, configure that proxy on that bastion’s host record.Important: env vars and startup command run on the target
Environment variables and startup commands you set on the host record run on the target host only — not on the bastions in between. Bastions are pass-through; they don’t execute your remote shell. If you need something to happen on a bastion (e.g. set up a tunnel before continuing), give the bastion its own host record with the right startup command, and use it as a normal host directly when you need that setup.Picking the right bastions
Each entry in the chain is just another saved host. That means each one carries its own auth, port, jump chain, and proxy. So:- A bastion that itself sits behind another bastion can have its own jump chain — no need to duplicate that path on every downstream host.
- A bastion that uses a different SSH key than your target works fine — Rumus uses each entry’s own auth when connecting to that hop.
Troubleshooting
The connection hangs at one of the jump hosts
The connection hangs at one of the jump hosts
The bastion accepted you but couldn’t reach the next hop. Open the bastion directly (skip the chain) and try
ssh nexthop from there manually to see the real error.It says it can't reach the first hop
It says it can't reach the first hop
First-hop reachability is on you. Check that your network / VPN / proxy can reach the bastion, then check the bastion’s host record.
Auth fails on a middle hop
Auth fails on a middle hop
Open that bastion’s record and verify its auth method works in isolation. Saved Keychain / Saved Account references are easier to keep in sync across many records.
Is there a hop limit?
Is there a hop limit?
Practically, no — the chain is a list and Rumus walks it in order. In practice keep it as short as your network requires; every extra hop adds latency and a failure point.
Jump-chain issue we didn’t cover? Ask in the Rumus community.
Next steps
SSH host management
Configure the bastions you’ll chain through.
Proxy settings
Use HTTP / SOCKS5 proxies on the first hop.