Pages

Monday, 21 September 2020

portal, 基于rust的暴露local server到互联网的程序


Exposes local servers behind NATs and firewalls to the Internet.

中文文档

Getting Started

  • Download the pre-built binary suitable for your operating system from the release page (or build from source if you're familar with Rust)

  • Run the following command to open a portal tunnel

$ portal open 80
Forwarding: portals.rs:39755 -> 127.0.0.1:80
  • Now visit the address portals.rs:39755 and the connections will be forwarded to 127.0.0.1:80

More Examples

$ portal open 8888 192.168.0.1:3306 # Opens multiple tunnel at once
Forwarding: portals.rs:41657 -> 192.168.0.1:3306
Forwarding: portals.rs:38913 -> 127.0.0.1:8888

$ portal open 8000:8000             # Specifies the remote port (may fail if it's in use)
Forwarding: portals.rs:8000 -> 127.0.0.1:8000

For more details, run portal help


from https://github.com/wangyuntao/portal

-------------------------------------------


duck

Expose local servers behind NAT or firewall to the Internet.

Usage

On a publicly accessible machine, run:

./duck -l -addr :9990 -p test_password

On the machine where your local servers are running, run:

./duck -addr DUCK_SERVER_IP:9990 -p test_password <local server port> <local server port> ...

Now you can connect to the public duck server and the tcp traffic will be forwarded to your specific local server according to the port.


from https://github.com/wangyuntao/duck

No comments:

Post a Comment