In the era of Internet information, many companies or families share resources among multiple computers through the internal network. The technology used is the intranet penetration technology. Many people do not understand this technology. The following is a brief analysis of what is intranet penetration? How does intranet penetration work?.
When it comes to intranet penetration, first of all, the two types of Internet communication can communicate with each other in the Internet network. First, the public IP can communicate with each other; Second, in the LAN, private IP addresses of the same network segment can communicate with each other. Public IP and private IP cannot communicate with each other.
Routers generally have two IP addresses: one is the public IP address, which is used to communicate with computers in the public network, and the other is the intranet IP address, which is used to communicate with computers in the internal network and computers connected to the router. The only IP address obtained is the intranet IP address, which can only communicate with other computers in the public network through the router. It cannot directly communicate with computers in the external network itself.
This is the main reason why some websites can be browsed on computers in the LAN, but computers in the extranet cannot be opened
What is intranet penetration? The intranet mentioned above is actually a kind of local area network or office network built in the company and home to realize resource sharing among multiple computers, including equipment, data and data. The extranet is connected with other network systems by a gateway. Compared with the intranet, this network system is called the extranet, which is the Internet we often talk about.
Each machine in the network is addressed by IP address. When we dial up the Internet, the service provider will randomly assign a public IP address to us. With this public IP address, we can officially and legally access and share various resources in the Internet. You can access others and let others access you.
For reasons such as reasonable allocation and utilization of resources, the service providers usually provide dynamic IP for our ordinary Internet users to access the network. The local IP we get each time we log on to the network may be different. In this way, the public IP address information of our machine cannot be fixed, and others cannot access our server in a fixed way.
If we deploy servers and applications in the local area network, when we need to provide local services to access the Internet extranet connection, because the local server itself has no public IP, it cannot be achieved. At this time, we need the intranet penetration technology, that is, the intranet mapping, the intranet IP port mapping to the extranet to achieve access. The principle analysis of intranet penetration
Intranet penetration is also called NAT penetration. When the computer is in the LAN, the function of intranet penetration is address translation, that is, translating the address of the public network into a private address, and then using the routing method, ADSL broadband router has a dynamic or fixed public IP, and finally ADSL is directly on the switch, In this way, all computers can share the Internet.
In addition to realizing the network communication function between machines in the intranet, intranet penetration can also solve the problem of unstable data transmission in UDP. How to achieve intranet penetration can be achieved by opening a third-party port. We can install the Kingway Express resolution software client on the server computer, add the mapping, and configure the mapping port information. The address of the intranet is the domain name accessed after the mapping, It can also be your own or the default domain name.
Intranet penetration is achieved through port mapping. Then, through intranet penetration, use the domain name for the corresponding intranet application. If the Internet address uses its own domain name, you can use it by pointing the domain name resolution to the prompt target address.