What's the use of intranet penetration?
Users whose broadband is intranet IP are intranet users, and the IP addresses within the following range belong to intranet reserved addresses, that is, intranet IP rather than public IP:
10.0.0.0- 10.255.255.255;
100.64.0.0- 100. 127.255.255;
172. 16.0.0- 172.3 1.255.255;
192. 168.0.0- 192. 168.255.255。
For example, the intranet IP allocated to all users in a certain community is connected to the external network through the public gateway, and each user's computer in the community can connect to the external network, but other users on the Internet can't send connection requests to the intranet computers, naturally they can't access the websites built by the intranet computers, and they can't provide the intranet computers with download and transmission services such as BT download and electric donkey, which can only be supported by public IP.
Intranet penetration means NAT penetration, which maps the host's intranet (LAN)IP address to a public network (WAN)IP address through port mapping, so that users on the Internet can access websites or servers provided by specific intranet hosts through this public network IP address.
Intranet Infiltration Course: DDNS Port Mapping of Peanut Shell
1, peanut shell client, users without passports need to register a peanut shell passport first.
2. Install peanut shells in Windows 10 system, and log in after completion.
3. Click on the client intranet mapping to jump to the intranet mapping page of peanut shell management, where you can directly add mapping to the domain name, even if you are not at the server site, you can also manage it remotely.
The following describes the steps to add an intranet map:
1. Click Intranet Mapping-Add Mapping.
2. On the Add Mapping page, fill in the application name, intranet server IP, intranet service port and select the form of extranet port, and then click OK.
3. After successful addition, an external network access address will be generated.
4. Enter the external network access address in the browser address bar to successfully access the services and applications built by the internal network host.
5. After the port mapping is completed, intranet users can freely use powerful Internet services like public users. In addition to building websites, users who have completed intranet penetration can easily build and access remote desktops, remotely monitor cameras, play games by themselves and build various office systems.
Here, we introduce the method of using peanut shells for intranet penetration in Windows 10 system. The method is not complicated, just download and install the peanut shell, and then make some settings in the peanut shell.