Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

At present, how many mainstream intranet penetration methods do you know?

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

Sometimes, we want to access the information of the home or company host outside, either because the host is under the intranet, or it is a public network IP randomly assigned by the operator, it is difficult to directly connect to the host to obtain the information. So, what can be done to solve this problem? The answer is intranet penetration.

When the host in the intranet does not have a static IP address to be stably accessed by the external network, you can use intranet penetration.

NATAPP

Ngrok-based domestic charging intranet penetration tool, free version: http,https,tcp full tunnel penetration, random domain name/TCP port, irregular forced replacement of domain name/port, custom local port, temporary use can be.

frp

Is a high-performance reverse proxy application, supports tcp, http, https and other protocol types, and web services support routing and forwarding based on domain names. If you set up your own, you need a device with a public network IP. You need to manually drive the client and server to start it. This is more troublesome and also has certain requirements for technology.

Relatively complex to use and requires proxy server support

ngrok

ngrok is a reverse proxy that establishes a secure channel between a common endpoint and a locally running Web server. ngrok captures and analyzes traffic on all channels for later analysis and response.

Luci now comes with server and client, that is to say, if there is a public IP, it can be used as the server side of ngrok.

peanut shell

Peanut shell is both intranet penetration software and port mapping software. Features are relatively complete, relatively simple, but also familiar to everyone, support tcp,udp.https.http,socket5 application. Traffic still has to go through the legendary rootnode, so it is current-limited 1G, divided into more grades commercial version, flagship version, platinum version, need to pay according to different needs to open related functions.

Zero Escape NAS Companion

Zero Escape NAS companion, sounds like NAS is not removable relationship, in fact, it is an intranet penetration hardware, not only for NAS, other intranets can also be used, point-to-point transmission mode, the official claim is that the speed can reach the bandwidth uplink, but does not support the iOS system, a single investment can be accepted, set up relatively simple, there are some mobile office requirements is also very applicable.

Having said so much, those with technology can completely create an intranet penetration by themselves. They can achieve intranet penetration through V*N. They are composed of a public network master node (server) and an intranet sub-node (client). Through virtual private networks, you can access the devices corresponding to private IPs, regardless of the network topology. You can connect to the Server.

If you are a non-technical person, you don't have to toss around those difficult codes and programs, and you don't need a public ip. The peanut shells or zero-escape nas partners above are relatively suitable.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report