当前位置:网站首页>Intranet penetration lanproxy deployment
Intranet penetration lanproxy deployment
2022-08-01 19:30:00 【little black note】
The environment used this time is centos 7.9
Both windows and Linux environments support the installation of both the server and the client.jdk
It is best to download the server and client as a set
Server: proxy-server
Client: proxy-client
1. Server deployment
1. In the server server, under the root directory, create a proxy directory
Instruction: mkdir /root/proxy
Verification means: ls /root Check whether the displayed content isContains proxy directory
2. Upload all files in the "server" directly to the /root/proxy directory
3. Start the intranet penetration service
Command: chmod +x /root/proxy/bin/startup.sh
Command: /root/proxy/bin/startup.sh
Verification method: ps -ef |grep lanproxy to see if there is any feedback
4. Set the service to start automatically at boot
Command: echo /root/proxy/bin/startup.sh >> /etc/rc.local
Verification method: cat /etc/rc.local to check whether it contains/root/proxy/bin/startup.sh
5. Web page login verification http://server IP: 8090 (I have to use the virtual machine for the experimental environment)
Username: admin Password: admin #Available in the configuration file /root/proxy/conf/config.Modify in properties
server.bind=0.0.0.0server.port=4900server.ssl.enable=trueserver.ssl.bind=0.0.0.0server.ssl.port=4993server.ssl.jksPath=testca.jksserver.ssl.keyStorePassword=testserver.ssl.keyManagerPassword=testserver.ssl.needsClientAuth=falseconfig.server.bind=0.0.0.0config.server.port=8090config.admin.username=adminconfig.admin.password=admin
6. Port opening
Cloud host release: 4900, 4993, 8090, 10000-11000 port segment
Second, client deployment
1. In the client, under the root directory, create a proxy directory
Instruction: mkdir /root/proxy
Verification method: ls /root Check whether the displayed content containsproxy directory
2. Upload all files in the "client" directly to the /root/proxy directory
3. Create a client
Log in to the server web management interface and create a client

Copy client key
Log in to the client command line interface and modify the configuration file:
Modify the /root/proxy/conf/config.properties file as follows
ssl.enable=truessl.jksPath=testca.jksssl.keyStorePassword=testserver.host=192.168.163.100 #Here write the actual application scenario serverget IP#default ssl port is 4993server.port=4993client.key=a97d7d802a04430e886ccc7187d2f0c3 #client key4. Start the intranet penetration client
Command: chmod +x /root/proxy/bin/startup.sh
Command: /root/proxy/bin/startup.sh
Verification means: ps -ef |grep lanproxy to see if there is any feedback
5. Set the service to start automatically at boot
Command: echo /root/proxy/bin/startup.sh >> /etc/rc.local
Verification means: cat /etc/rc.local to see if it contains/root/proxy/bin/startup.sh
6. Log in to the web management interface of the server and check the online status of the client.
Do client port mapping
"Proxy name": Named after the port name that needs to be mapped, here is port 22
"Public network port": Port between 10000-11000, generally a single client is assigned 10 consecutive port numbers, the firstClient port range 10000-10009, and so on
"backend IP port": 127.0.0.1:22 (22 here is consistent with "proxy name")
Multiple ports can be added, for example:
边栏推荐
猜你喜欢

Keras深度学习实战——交通标志识别

#yyds dry goods inventory# Interview must brush TOP101: the last k nodes in the linked list

Hardware Bear Original Collection (Updated 2022/07)

PHP 安全最佳实践

分享一个适用于MCU项目的代码框架

SENSORO成长伙伴计划 x 怀柔黑马科技加速实验室丨以品牌力打造To B企业影响力

win10,在proe/creo中鼠标中键不能放大缩小

部署zabbix

【pyqt5】自定义控件 实现能够保持长宽比地缩放子控件

odoo coding conventions (programming conventions, coding guidelines)
随机推荐
JS数组过滤
Pytorch模型训练实用教程学习笔记:二、模型的构建
log factory (detail)
cf:D. Magical Array【数学直觉 + 前缀和的和】
From ordinary advanced to excellent test/development programmer, all the way through
Become a Contributor in 30 minutes | How to participate in OpenHarmony's open source contributions in multiple ways?
屏:全贴合工艺之GFF、OGS、Oncell、Incell
安装win32gui失败,解决问题
安全作业7.25
【神经网络】一文带你轻松解析神经网络(附实例恶搞女友)
MySQL开发技巧——并发控制
MySQL开发技巧——存储过程
Keras深度学习实战——交通标志识别
在表格数据上,为什么基于树的模型仍然优于深度学习?
为你的“架构”安排定期体检吧!
Goldfish Brother RHCA Memoirs: CL210 manages OPENSTACK network -- network configuration options
Website construction process
【1374. 生成每种字符都是奇数个的字符串】
mysql函数的作用有哪些
Database Plus 的云上之旅:SphereEx 正式开源 ShardingSphere on Cloud 解决方案