Pages

Thursday, 21 May 2020

把内网暴露到公网的工具-portal和duck

Exposes local servers behind NATs and firewalls to the Internet.

Getting Started

  • Download the pre-built binary suitable for your operating system from the release page (or build from source if you're familar with Rust)
  • Run the following command to open a portal tunnel
$ portal open 80
Forwarding: portals.rs:39755 -> 127.0.0.1:80
  • Now visit the address portals.rs:39755 and the connections will be forwarded to 127.0.0.1:80

More Examples

$ portal open 8888 192.168.0.1:3306 # Opens multiple tunnel at once
Forwarding: portals.rs:41657 -> 192.168.0.1:3306
Forwarding: portals.rs:38913 -> 127.0.0.1:8888

$ portal open 8000:8000             # Specifies the remote port (may fail if it's in use)
Forwarding: portals.rs:8000 -> 127.0.0.1:8000
For more details, run portal help
----------------------------

Expose local servers behind NAT or firewall to the Internet

Usage

On a publicly accessible machine, run:
./duck -l -addr :9990 -p test_password
On the machine where your local servers are running, run:
./duck -addr DUCK_SERVER_IP:9990 -p test_password   ...
Now you can connect to the public duck server and the tcp traffic will be forwarded to your specific local server according to the port.

No comments:

Post a Comment