When using Protocol Tunnel jump source IP should be forwarded to the destination server. Customers do use applications like SQL, PGadmin and many more where a client is installed on the host machine where they would establish the protocol tunnel jump. Then the request lands on the jump point and then the connection established. Now in this all the times the jump point ip address is visibile on the destination server. where as it would be efficient if we can get the source from where the request is generated by which the security level increases and would impact in enhancing access to critical apps like database.