首页 > 其他分享 >frp 内网穿透

frp 内网穿透

时间:2024-09-14 16:24:42浏览次数:3  
标签:false log default value 穿透 frp port addr

frp 内网穿透_TCP

 用的frp0.36_2 版本

# [common] is integral section
[common]
# A literal address or host name for IPv6 must be enclosed
# in square brackets, as in "[::1]:80", "[ipv6-host]:http" or "[ipv6-host%zone]:80"
# For single "bind_addr" field, no need square brackets, like "bind_addr = ::".
bind_addr = 0.0.0.0
bind_port = 7000

# udp port to help make udp hole to penetrate nat
bind_udp_port = 7001

# udp port used for kcp protocol, it can be same with 'bind_port'
# if not set, kcp is disabled in frps
kcp_bind_port = 7000

# specify which address proxy will listen for, default value is same with bind_addr
# proxy_bind_addr = 127.0.0.1

# if you want to support virtual host, you must set the http port for listening (optional)
# Note: http port and https port can be same with bind_port
vhost_http_port = 80
vhost_https_port = 443

# response header timeout(seconds) for vhost http server, default is 60s
# vhost_http_timeout = 60

# tcpmux_httpconnect_port specifies the port that the server listens for TCP
# HTTP CONNECT requests. If the value is 0, the server will not multiplex TCP
# requests on one single port. If it's not - it will listen on this value for
# HTTP CONNECT requests. By default, this value is 0.
# tcpmux_httpconnect_port = 1337

# set dashboard_addr and dashboard_port to view dashboard of frps
# dashboard_addr's default value is same with bind_addr
# dashboard is available only if dashboard_port is set
dashboard_addr = 0.0.0.0
dashboard_port = 7500

# dashboard user and passwd for basic auth protect, if not set, both default value is admin
dashboard_user = admin
dashboard_pwd = admin

# enable_prometheus will export prometheus metrics on {dashboard_addr}:{dashboard_port} in /metrics api.
enable_prometheus = true

# dashboard assets directory(only for debug mode)
# assets_dir = ./static

# console or real logFile path like ./frps.log
log_file = ./frps----.log

# trace, debug, info, warn, error
log_level = info

log_max_days = 3

# disable log colors when log_file is console, default is false
disable_log_color = false

# DetailedErrorsToClient defines whether to send the specific error (with debug info) to frpc. By default, this value is true.
detailed_errors_to_client = true

# authentication_method specifies what authentication method to use authenticate frpc with frps.
# If "token" is specified - token will be read into login message.
# If "oidc" is specified - OIDC (Open ID Connect) token will be issued using OIDC settings. By default, this value is "token".
authentication_method = token

# authenticate_heartbeats specifies whether to include authentication token in heartbeats sent to frps. By default, this value is false.
authenticate_heartbeats = false

# AuthenticateNewWorkConns specifies whether to include authentication token in new work connections sent to frps. By default, this value is false.
authenticate_new_work_conns = false

# auth token
token = 12345678

# oidc_issuer specifies the issuer to verify OIDC tokens with.
# By default, this value is "".
oidc_issuer =

# oidc_audience specifies the audience OIDC tokens should contain when validated.
# By default, this value is "".
oidc_audience =

# oidc_skip_expiry_check specifies whether to skip checking if the OIDC token is expired.
# By default, this value is false.
oidc_skip_expiry_check = false


# oidc_skip_issuer_check specifies whether to skip checking if the OIDC token's issuer claim matches the issuer specified in OidcIssuer.
# By default, this value is false.
oidc_skip_issuer_check = false

# heartbeat configure, it's not recommended to modify the default value
# the default value of heartbeat_timeout is 90
# heartbeat_timeout = 90

# user_conn_timeout configure, it's not recommended to modify the default value
# the default value of user_conn_timeout is 10
# user_conn_timeout = 10

# only allow frpc to bind ports you list, if you set nothing, there won't be any limit
allow_ports = 2000-3000,3001,3003,4000-50000

# pool_count in each proxy will change to max_pool_count if they exceed the maximum value
max_pool_count = 5

# max ports can be used for each client, default value is 0 means no limit
max_ports_per_client = 0

# tls_only specifies whether to only accept TLS-encrypted connections. By default, the value is false.
tls_only = false

# tls_cert_file = server.crt
# tls_key_file = server.key
# tls_trusted_ca_file = ca.crt

# if subdomain_host is not empty, you can set subdomain when type is http or https in frpc's configure file
# when subdomain is test, the host used by routing is test.frps.com
subdomain_host = kmylcloud.com

# if tcp stream multiplexing is used, default is true
tcp_mux = true

# custom 404 page for HTTP requests
# custom_404_page = /path/to/404.html

# specify udp packet size, unit is byte. If not set, the default value is 1500.
# This parameter should be same between client and server.
# It affects the udp and sudp proxy.
udp_packet_size = 1500

#[plugin.user-manager]
#addr = dfgfdg:9000
#path = /handler
#ops = Login

#[plugin.port-manager]
#addr = dfgfdg:9001
#path = /handler
##ops = NewProxy

客户端linux

[common]
server_addr = dfgfdg
server_port = 7000
token = 12345678
tcp_mux = true
log_file = ./frpc-.log
log_level = info
log_max_days = 3
authentication_timeout = 0

[ssh]                                                   # 添加ssh节点 
type = tcp
local_ip = 192.168.18.128
local_port = 22
remote_port = 7009

#[web01]                                                        # 添加web节点
#type = http
#local_ip = 192.168.18.70
#local_port = 31180                             # 本地8080端口可以通公网服务器7002端口访问,这里我的8080跑着tomcat
#subdomain = web01                              # 自定义子域名



[web01]
type = http
local_ip = 192.168.18.70
local_port = 31180
use_encryption = false
use_compression = false
subdomain = web01
custom_domains = web01.yourdomain.com


[lu]
type = http
local_ip = 192.168.18.1
local_port = 80
use_encryption = false
use_compression = false
subdomain = lu
custom_domains = lu.yourdomain.com



[hab]
type = http
local_ip = 192.168.18.91
local_port = 9443
use_encryption = false
use_compression = false
subdomain = hab
custom_domains = hab.yourdomain.com

客户端windows

[common]
server_addr = dfgfdg
server_port = 7000
token = 12345678
tcp_mux = true
log_file = ./frpc-.log
log_level = info
log_max_days = 3
authentication_timeout = 0


[ybmed]
type = http
local_ip = 192.168.7.100
local_port = 7778
use_encryption = false
use_compression = false
subdomain = ybmed
custom_domains = ybmed.yourdomain.com

 

标签:false,log,default,value,穿透,frp,port,addr
From: https://blog.51cto.com/u_15460722/12017730

相关文章

  • 内网穿透技术的思考--反向代理、TCP 隧道、 UDP 打洞--C++代码示例
    概述内网穿透是一种技术,用于在私有局域网(LAN)中的设备与外部网络(如互联网)之间建立通信通道,使得外部设备可以访问内网中的服务。由于内网设备通常位于防火墙或NAT(网络地址转换)设备之后,外部网络无法直接访问它们。因此,内网穿透技术旨在解决这一问题。本文将讨论如何使用C++实现......
  • 搭建Jellyfin、Plex、Emby媒体服务,贝锐花生壳轻松内网穿透远程访问
    很多使用品牌NAS或自建NAS的小伙伴都有媒体库的需求,其中Jellyfin、Plex和Emby是三款流行的媒体服务方案。以Jellyfin为例,系统允许用户组织、串流和管理他们的多媒体藏品,包括视频、音乐和图片。由于,很多品牌NAS比如,群晖、威联通、铁威马等,以及TrueNAS、UnRaid等NAS系统,都已经集成了......
  • CPP在内网穿透技术的思考
    概述内网穿透是一种技术,用于在私有局域网(LAN)中的设备与外部网络(如互联网)之间建立通信通道,使得外部设备可以访问内网中的服务。由于内网设备通常位于防火墙或NAT(网络地址转换)设备之后,外部网络无法直接访问它们。因此,内网穿透技术旨在解决这一问题。本文将讨论如何使用C++实现内......
  • SOCKS5代理实现穿透与端口映射的终极指南
    在如今这个数字化信息时代,网络代理技术已经成为了许多互联网用户的必备工具。尤其是SOCKS5代理,它不仅能帮助我们实现穿透,还能进行端口映射。今天,我们就来深入探讨一下如何通过SOCKS5代理实现这些功能。什么是SOCKS5代理?SOCKS5代理是一种网络代理协议,它能够在客户端与服务器......
  • 本地Linux服务器安装Nginx流程结合内网穿透实现无公网IP远程连接
    文章目录前言1.安装Docker2.使用Docker拉取Nginx镜像3.创建并启动Nginx容器4.本地连接测试5.公网远程访问本地Nginx5.1内网穿透工具安装5.2创建远程连接公网地址5.3使用固定公网地址远程访问前言在开发人员的工作中,公网远程访问内网是其必备的技术需求之一......
  • redis的雪崩、击穿和穿透
    redis是一种缓存工具,可以大大减少对数据库访问时数据库的压力,同时也可以让我们在对数据的读取时更方便,但由于某些因素,redis也可能会存在雪崩、击穿和穿透的风险:(引用自https://blog.csdn.net/wangxuanyang_zer/article/details/134420084)1、雪崩:是指在某一时间内大量的缓存失效或......
  • Java中的缓存穿透与雪崩问题:解决方案与设计模式
    Java中的缓存穿透与雪崩问题:解决方案与设计模式大家好,我是微赚淘客返利系统3.0的小编,是个冬天不穿秋裤,天冷也要风度的程序猿!在分布式系统中,缓存是提高性能的重要手段。然而,缓存系统在实际应用中常常会遇到缓存穿透和缓存雪崩这两种问题。本文将探讨这两种问题的成因以及在Java中......
  • NATAPP实现内网穿透简易教程
    NATAPP是什么NATAPP是一个十分容易上手的内网穿透工具,可以把本机的ip和端口映射到公网,将本机暴露在公网中供他人访问。这在进行一些回调接口的本地测试(如支付宝微信支付的回调接口)时十分好用,同时也可以用来搭建服务器私服,和朋友一起畅快联机。NETAPP提供了两条免费隧道供注册用......
  • frp(fast reverse proxy)是一款高性能的反向代理应用
    frp是什么frp(fastreverseproxy)是一款高性能的反向代理应用,专注于内网穿透。它支持多种协议,包括TCP、UDP、KCP、HTTP、HTTPS等,并且具备P2P通信功能。使用frp,您可以安全、便捷地将内网服务暴露到公网,通过拥有公网IP的节点进行中转。内网穿透使用场景远程桌面或者是访......
  • frp 内网穿透
     用的frp0.36_2版本#[common]isintegralsection[common]#AliteraladdressorhostnameforIPv6mustbeenclosed#insquarebrackets,asin"[::1]:80","[ipv6-host]:http"or"[ipv6-host%zone]:80"#Forsingle"bind_a......