Unexpectedly (how to write the intranet penetration solution), how to write the intranet penetration solution well, and how to “do it”,
Introduction to the scenario The boss found the product manager and said, “The customer wants to see the project, you do it, and build the demo website.” The product manager found the technical team leader and said, “The customer wants to see the project, you do it, and let the customer access the demo website.” The technical team leader found programmer Xiao A and said, “The customer wants to see the project, you do it, and let him access the demo website you do.”
Small A: “My demo is still in development, and it’s still local to my computer. What’s the problem??” The team leader threw a document link: “Follow the instructions to [do].” Intranet penetration is an intranet penetration service that can map local and local network sites to public network access. It is very simple to use, with almost no threshold – no registration, no payment, no traffic restriction, and no cumbersome configuration, Support win/mac/linux.
The following are three typical use scenarios: 1. You can use this service to map the local demo to the customer, without spending much time to build a temporary public network test environment 2. Applet development, official account development, WeChat payment development, Alipay callback, and so on. The interfaces of these callback classes can be directly called back to the local machine through this service, facilitating local debugging.
It saves the trouble of updating the server every time you debug. 3. A machine with a computer/nas at home can map the web management interface to the public network, which is convenient for network access when you go out. There are more use scenarios to be explored. This service provides a capability that allows the local computer and local area network to be accessed by the public network.
How to use the window user to click to download gaoyixia-win.zip to download, extract it to any directory, and then double-click to run. According to the prompt, enter the local machine or LAN address port to be mapped to run, and then get a public address, which can be accessed after copying to the browser (do not copy directly with Crtl+C, and will exit the program. It is recommended to select copy with the mouse).
The mac user opens the terminal and executes the following command # Download the execution file wget-c“ https://www.showdoc.com.cn/server/api/attachment/visitFile?sign=f9bde9f10b6d1fdb26ca353f49bf89c6 “
-Ogaoyixia – mac os # Grant execution permission chmod+xgaoyixia – mac os # to run/ Gaoyixia-macos-h127.0.0.1-p80 # After running, you will get a public address and copy it to the browser to access it (do not copy directly with Crtl+C, you will exit the program, and it is recommended to select copy with the mouse).
#The – h 127.0.0.1 – p 80 in the above command indicates the address and port. You can also fill in the LAN address, for example/ Gaoyixia-macos-hlocal.oa.com-p80Linux users open the terminal and execute the following command.
#Download the executable file wget-c“ https://www.showdoc.com.cn/server/api/attachment/visitFile?sign=e491f057ff8e77dedcdf1b3d7560eb4d “
-Ogaoyixia – linux # Grant the execution permission chmod+xgaoyixia – linux # to run/ Gaoyixia-linux-h127.0.0.1-p80 # After running, you will get a public address and copy it to the browser to access it (do not copy directly with Crtl+C, you will exit the program, and it is recommended to select copy with the mouse).
#The – h 127.0.0.1 – p 80 in the above command indicates the address and port. You can also fill in the LAN address, for example/ Gaoyixia-linux-local.oa.com-p80 Access restrictions To prevent abuse, this service adds some restrictions:.
1. The public address obtained by the user is completely random, and the user-defined sub-domain name is not open for the time being. 2. Each public address is only allowed to access the first 10 different IP addresses, which will be restricted if it exceeds the limit. 3. Each public address is valid for a maximum of one week, and cannot be accessed if it expires. Therefore, do not use it to build a long-term service. The validity period may be shortened depending on abuse.
However, the service will be kept for at least one day. It is encouraged to use the service for development and testing and other scenarios used by a small number of people. It is prohibited to build public services and other services that are not recognized by law.