Exposes local servers behind NATs and firewalls to the Internet.
Getting Started
- Download the pre-built binary suitable for your operating system from the release page (or build from source if you're familar with Rust)
- Run the following command to open a portal tunnel
$ portal open 80
Forwarding: portals.rs:39755 -> 127.0.0.1:80
- Now visit the address
portals.rs:39755
and the connections will be forwarded to127.0.0.1:80
More Examples
$ portal open 8888 192.168.0.1:3306 # Opens multiple tunnel at once
Forwarding: portals.rs:41657 -> 192.168.0.1:3306
Forwarding: portals.rs:38913 -> 127.0.0.1:8888
$ portal open 8000:8000 # Specifies the remote port (may fail if it's in use)
Forwarding: portals.rs:8000 -> 127.0.0.1:8000
For more details, run
portal help
----------------------------
Expose local servers behind NAT or firewall to the Internet
Usage
On a publicly accessible machine, run:
./duck -l -addr :9990 -p test_password
On the machine where your local servers are running, run:
./duck -addr DUCK_SERVER_IP:9990 -p test_password ...
Now you can connect to the public duck server and the tcp traffic will be forwarded to your specific local server according to the port.
No comments:
Post a Comment