Yes.  And:

  • You can chain together multiple jump hosts to access restricted segments. 

  • Incident responders can chain together disposable hosts to access sites to hide where they are operating from. 

  • After your investigation, jump hosts can be destroyed.

This capability helps you continue to use segmentation to secure at the network level, and ensures that attackers on remote systems will have a very difficult time determining your operating network if you wish to remain hidden.