Intranet penetration technology: When it comes to intranet penetration, I believe many people must have a half-understanding of what is intranet penetration! Under what circumstances do you need intranet penetration! Next, I will briefly explain the principle of intranet penetration, that is, NAT penetration. The purpose of NAT penetration is to ensure that packets with a specific source IP address and source port number are not shielded by NAT devices and are correctly routed to intranet hosts.
The following describes the relative position of the host communicating with each other in the network and the NAT device. At present, the mainstream enterprise-level penetration technology is PHTunnel and Wangooe Tunnel technology. At present, the domestic enterprise-level service providers of intranet penetration include peanut shell and Shenzhuo Internet. I have contacted many companies in use. The peanut shell penetration technology is PHTunnel, and Shenzhuo Internet uses Wangooe Tunnel technology, which is applied to enterprise-level, Here we will introduce Shenzhuo Internet penetration, and then we will introduce and analyze the usage and technical points of this software.
If you have not been exposed to the intranet penetration technology, you can take a look at this picture: Shenzhuo Internet
In general, the intranet penetration protocol technology is mainly used for projects that do not have public IP and need other LANs to access their own home or company’s computers or servers, such as corporate OA office software, ERP, etc., which are very convenient to use. At present, there are two common types in the market. One is self-operated and has its own core technology, The second is an open source project developed by netizens themselves in their spare time.
First of all, peanut shell and peanut shell have their own core technology, which allows applications to access at any time without public IP, supports HTTP, HTTPS, SSH, RDP and other transmission protocols, and supports IPV4 and IPV6 network access.
Download: What is intranet penetration? What is the use of intranet penetration- Advantages of Beirui Peanut Shell official website: fast, stable and reliable, with disadvantages of after-sales support: charge 2. Shenzhuo Internet Shenzhuo Internet – adopts the independently developed WanGooe Tunnel communication protocol, has its own core engine, does not need public IP, and is fast to build, self-operated, and can be used for a long time.
Download: Shenzhuo Internet – Intranet penetration | DDNS | Port mapping tool advantages: fast running, stable and reliable, with disadvantages of after-sales support: charge 3. ngrok is an open source project that can be built and used by itself, and needs to rent cloud servers to build, with difficulty of 3 stars, and needs to know more about Linux system.
Advantages: Free disadvantages: You need to rent your own server, and ngrok has stopped updating. Many netizens report that it is very easy to cause memory overflow without after-sales service. 4. FRP is an open source project that can be built and used by yourself, and you need to rent your own cloud server to build it. The difficulty level is 4 stars, and people who need to know more about Linux system, there is another kind of people called nps, which is a variant of FRP, It is convenient for developers to connect and use.
Advantages: Free disadvantages: You need to rent your own server. The FRP has not been updated for a long time. You can build and learn it by yourself. When the FRP runs for a certain period of time, it will be disconnected. Many netizens report that there will be deadlock problems, including variants that are also free of after-sales service. The above are some common software at present, such as those used by companies. It is recommended to use mature and stable payment. After all, the company’s operation is guaranteed. If you build and learn by yourself, Open source can be built and played, such as ngrok and frp. It is just that cloud servers are too expensive and cannot be used commercially. After all, many parts of open source are imperfect, and have not been tested professionally. There are many problems, especially repeated abnormal disconnection.