Frp内网穿透配置

Frp基本信息

frp全名Fast Reverse Proxy,是用于提供内网穿透服务的工具,主要用于解决一些内网服务没有公网ip但是却需要提供外网访问的问题。使用frp你可以将内网中的TCP、UDP、HTTP、HTTPS等协议类型的服务发布到公网,并且支持Web服务根据域名进行路由转发。
frp已经将项目开源至github,想深入了解的朋友可以点击跳转地址,进行深入了解:github项目地址(frp)

Frp使用要求

Frp使用要求

如上图的frp架构图所示:1、(必须)想要使用frp服务,将内网中的服务发布到公网。你需要先拥有一台拥有公网ip的网络设置搭建frp服务端,再在内网需要穿透的设置中搭建frp客户端服务才能进行穿透;2、(非必需)你需要拥有一个域名解析到公网的ip地址,才能够实现web服务的通过域名进行路由转发的功能。

Frp服务的搭建

搭建frp很简单,关键的步骤只有三步:
1、获取frp文件;
2、设置frp配置文件;
3、启动frp服务。
注意:frp搭建的的这三步是分为客户端和服务端的,但是操作基本是一致的。本教程frp服务的搭建主要介绍frp搭建的主要三步,以及frp服务端和客户端配置文件内容的解释说明,以及如何将frp在linux系统中创建systemd服务,进行服务管理。

第一步:获取frp文件

frp支持linux平台和windows平台。参照你的设置的运行平台下载linux版本的文件或者是windows的。
下载地址:https://github.com/fatedier/frp/releases
一般linux平台下载的版本为:frp_版本号_linux_amd64.tar.gz
windows平台下载的版本为:frp_版本号_windows_amd64.zip
linux版本文件的解压命令为tar zxvf 文件名,windows版本文件直接右键解压即可。
文件解压后,一般都含有frps(frp服务端运行文件)、frpc(frp客户端运行文件)、frps.ini(frp服务端配置文件)、frpc.ini(frp客户端配置文件),以及frp_full.ini(frp全部配置文件解释说明和参考。)

第二步:frp配置文件设置

frp配置文件分为服务端和客户端,想要正常只用frp工具,我们需要对服务端和客户端的配置文件分别进行设置。
官方中文文档:https://gofrp.org/docs/

  • frps.ini(服务端)配置文件解释说明:

    # [common] is integral section
    [common]
    # A literal address or host name for IPv6 must be enclosed
    # in square brackets, as in "[::1]:80", "[ipv6-host]:http" or "[ipv6-host%zone]:80"
    # For single "bind_addr" field, no need square brackets, like "bind_addr = ::".
    bind_addr = 0.0.0.0
    bind_port = 7000
    
    # udp port used for kcp protocol, it can be same with 'bind_port'.
    # if not set, kcp is disabled in frps.
    kcp_bind_port = 7000
    
    # udp port used for quic protocol.
    # if not set, quic is disabled in frps.
    # quic_bind_port = 7002
    # quic protocol options
    # quic_keepalive_period = 10
    # quic_max_idle_timeout = 30
    # quic_max_incoming_streams = 100000
    
    # specify which address proxy will listen for, default value is same with bind_addr
    # proxy_bind_addr = 127.0.0.1
    
    # if you want to support virtual host, you must set the http port for listening (optional)
    # Note: http port and https port can be same with bind_port
    vhost_http_port = 80
    vhost_https_port = 443
    
    # response header timeout(seconds) for vhost http server, default is 60s
    # vhost_http_timeout = 60
    
    # tcpmux_httpconnect_port specifies the port that the server listens for TCP
    # HTTP CONNECT requests. If the value is 0, the server will not multiplex TCP
    # requests on one single port. If it's not - it will listen on this value for
    # HTTP CONNECT requests. By default, this value is 0.
    # tcpmux_httpconnect_port = 1337
    
    # If tcpmux_passthrough is true, frps won't do any update on traffic.
    # tcpmux_passthrough = false
    
    # set dashboard_addr and dashboard_port to view dashboard of frps
    # dashboard_addr's default value is same with bind_addr
    # dashboard is available only if dashboard_port is set
    dashboard_addr = 0.0.0.0
    dashboard_port = 7500
    
    # dashboard user and passwd for basic auth protect
    dashboard_user = admin
    dashboard_pwd = admin
    
    # dashboard TLS mode
    dashboard_tls_mode = false
    # dashboard_tls_cert_file = server.crt
    # dashboard_tls_key_file = server.key
    
    # enable_prometheus will export prometheus metrics on {dashboard_addr}:{dashboard_port} in /metrics api.
    enable_prometheus = true
    
    # dashboard assets directory(only for debug mode)
    # assets_dir = ./static
    
    # console or real logFile path like ./frps.log
    log_file = ./frps.log
    
    # trace, debug, info, warn, error
    log_level = info
    
    log_max_days = 3
    
    # disable log colors when log_file is console, default is false
    disable_log_color = false
    
    # DetailedErrorsToClient defines whether to send the specific error (with debug info) to frpc. By default, this value is true.
    detailed_errors_to_client = true
    
    # authentication_method specifies what authentication method to use authenticate frpc with frps.
    # If "token" is specified - token will be read into login message.
    # If "oidc" is specified - OIDC (Open ID Connect) token will be issued using OIDC settings. By default, this value is "token".
    authentication_method = token
    
    # authenticate_heartbeats specifies whether to include authentication token in heartbeats sent to frps. By default, this value is false.
    authenticate_heartbeats = false
    
    # AuthenticateNewWorkConns specifies whether to include authentication token in new work connections sent to frps. By default, this value is false.
    authenticate_new_work_conns = false
    
    # auth token
    token = 12345678
    
    # oidc_issuer specifies the issuer to verify OIDC tokens with.
    # By default, this value is "".
    oidc_issuer =
    
    # oidc_audience specifies the audience OIDC tokens should contain when validated.
    # By default, this value is "".
    oidc_audience =
    
    # oidc_skip_expiry_check specifies whether to skip checking if the OIDC token is expired.
    # By default, this value is false.
    oidc_skip_expiry_check = false
    
    # oidc_skip_issuer_check specifies whether to skip checking if the OIDC token's issuer claim matches the issuer specified in OidcIssuer.
    # By default, this value is false.
    oidc_skip_issuer_check = false
    
    # heartbeat configure, it's not recommended to modify the default value
    # the default value of heartbeat_timeout is 90. Set negative value to disable it.
    # heartbeat_timeout = 90
    
    # user_conn_timeout configure, it's not recommended to modify the default value
    # the default value of user_conn_timeout is 10
    # user_conn_timeout = 10
    
    # only allow frpc to bind ports you list, if you set nothing, there won't be any limit
    allow_ports = 2000-3000,3001,3003,4000-50000
    
    # pool_count in each proxy will change to max_pool_count if they exceed the maximum value
    max_pool_count = 5
    
    # max ports can be used for each client, default value is 0 means no limit
    max_ports_per_client = 0
    
    # tls_only specifies whether to only accept TLS-encrypted connections. By default, the value is false.
    tls_only = false
    
    # tls_cert_file = server.crt
    # tls_key_file = server.key
    # tls_trusted_ca_file = ca.crt
    
    # if subdomain_host is not empty, you can set subdomain when type is http or https in frpc's configure file
    # when subdomain is test, the host used by routing is test.frps.com
    subdomain_host = frps.com
    
    # if tcp stream multiplexing is used, default is true
    # tcp_mux = true
    
    # specify keep alive interval for tcp mux.
    # only valid if tcp_mux is true.
    # tcp_mux_keepalive_interval = 60
    
    # tcp_keepalive specifies the interval between keep-alive probes for an active network connection between frpc and frps.
    # If negative, keep-alive probes are disabled.
    # tcp_keepalive = 7200
    
    # custom 404 page for HTTP requests
    # custom_404_page = /path/to/404.html
    
    # specify udp packet size, unit is byte. If not set, the default value is 1500.
    # This parameter should be same between client and server.
    # It affects the udp and sudp proxy.
    udp_packet_size = 1500
    
    # Enable golang pprof handlers in dashboard listener.
    # Dashboard port must be set first
    pprof_enable = false
    
    # Retention time for NAT hole punching strategy data.
    nat_hole_analysis_data_reserve_hours = 168
    
    [plugin.user-manager]
    addr = 127.0.0.1:9000
    path = /handler
    ops = Login
    
    [plugin.port-manager]
    addr = 127.0.0.1:9001
    path = /handler
    ops = NewProxy
    
  • frpc.ini(客户端)配置文件解释说明:

    # [common] is integral section
    [common]
    # A literal address or host name for IPv6 must be enclosed
    # in square brackets, as in "[::1]:80", "[ipv6-host]:http" or "[ipv6-host%zone]:80"
    # For single "server_addr" field, no need square brackets, like "server_addr = ::".
    server_addr = 0.0.0.0
    server_port = 7000
    
    # STUN server to help penetrate NAT hole.
    # nat_hole_stun_server = stun.easyvoip.com:3478
    
    # The maximum amount of time a dial to server will wait for a connect to complete. Default value is 10 seconds.
    # dial_server_timeout = 10
    
    # dial_server_keepalive specifies the interval between keep-alive probes for an active network connection between frpc and frps.
    # If negative, keep-alive probes are disabled.
    # dial_server_keepalive = 7200
    
    # if you want to connect frps by http proxy or socks5 proxy or ntlm proxy, you can set http_proxy here or in global environment variables
    # it only works when protocol is tcp
    # http_proxy = http://user:passwd@192.168.1.128:8080
    # http_proxy = socks5://user:passwd@192.168.1.128:1080
    # http_proxy = ntlm://user:passwd@192.168.1.128:2080
    
    # console or real logFile path like ./frpc.log
    log_file = ./frpc.log
    
    # trace, debug, info, warn, error
    log_level = info
    
    log_max_days = 3
    
    # disable log colors when log_file is console, default is false
    disable_log_color = false
    
    # for authentication, should be same as your frps.ini
    # authenticate_heartbeats specifies whether to include authentication token in heartbeats sent to frps. By default, this value is false.
    authenticate_heartbeats = false
    
    # authenticate_new_work_conns specifies whether to include authentication token in new work connections sent to frps. By default, this value is false.
    authenticate_new_work_conns = false
    
    # auth token
    token = 12345678
    
    authentication_method = 
    
    # oidc_client_id specifies the client ID to use to get a token in OIDC authentication if AuthenticationMethod == "oidc".
    # By default, this value is "".
    oidc_client_id =
    
    # oidc_client_secret specifies the client secret to use to get a token in OIDC authentication if AuthenticationMethod == "oidc".
    # By default, this value is "".
    oidc_client_secret =
    
    # oidc_audience specifies the audience of the token in OIDC authentication if AuthenticationMethod == "oidc". By default, this value is "".
    oidc_audience =
    
    # oidc_scope specifies the permisssions of the token in OIDC authentication if AuthenticationMethod == "oidc". By default, this value is "".
    oidc_scope =
    
    # oidc_token_endpoint_url specifies the URL which implements OIDC Token Endpoint.
    # It will be used to get an OIDC token if AuthenticationMethod == "oidc". By default, this value is "".
    oidc_token_endpoint_url =
    
    # oidc_additional_xxx specifies additional parameters to be sent to the OIDC Token Endpoint.
    # For example, if you want to specify the "audience" parameter, you can set as follow.
    # frp will add "audience=<value>" "var1=<value>" to the additional parameters.
    # oidc_additional_audience = https://dev.auth.com/api/v2/
    # oidc_additional_var1 = foobar
    
    # set admin address for control frpc's action by http api such as reload
    admin_addr = 127.0.0.1
    admin_port = 7400
    admin_user = admin
    admin_pwd = admin
    # Admin assets directory. By default, these assets are bundled with frpc.
    # assets_dir = ./static
    
    # connections will be established in advance, default value is zero
    pool_count = 5
    
    # if tcp stream multiplexing is used, default is true, it must be same with frps
    # tcp_mux = true
    
    # specify keep alive interval for tcp mux.
    # only valid if tcp_mux is true.
    # tcp_mux_keepalive_interval = 60
    
    # your proxy name will be changed to {user}.{proxy}
    user = your_name
    
    # decide if exit program when first login failed, otherwise continuous relogin to frps
    # default is true
    login_fail_exit = true
    
    # communication protocol used to connect to server
    # supports tcp, kcp, quic, websocket and wss now, default is tcp
    protocol = tcp
    
    # set client binding ip when connect server, default is empty.
    # only when protocol = tcp or websocket, the value will be used.
    connect_server_local_ip = 0.0.0.0
    
    # quic protocol options
    # quic_keepalive_period = 10
    # quic_max_idle_timeout = 30
    # quic_max_incoming_streams = 100000
    
    # If tls_enable is true, frpc will connect frps by tls.
    # Since v0.50.0, the default value has been changed to true, and tls is enabled by default.
    tls_enable = true
    
    # tls_cert_file = client.crt
    # tls_key_file = client.key
    # tls_trusted_ca_file = ca.crt
    # tls_server_name = example.com
    
    # specify a dns server, so frpc will use this instead of default one
    # dns_server = 8.8.8.8
    
    # proxy names you want to start separated by ','
    # default is empty, means all proxies
    # start = ssh,dns
    
    # heartbeat configure, it's not recommended to modify the default value
    # The default value of heartbeat_interval is 10 and heartbeat_timeout is 90. Set negative value
    # to disable it.
    # heartbeat_interval = 30
    # heartbeat_timeout = 90
    
    # additional meta info for client
    meta_var1 = 123
    meta_var2 = 234
    
    # specify udp packet size, unit is byte. If not set, the default value is 1500.
    # This parameter should be same between client and server.
    # It affects the udp and sudp proxy.
    udp_packet_size = 1500
    
    # include other config files for proxies.
    # includes = ./confd/*.ini
    
    # If the disable_custom_tls_first_byte is set to false, frpc will establish a connection with frps using the
    # first custom byte when tls is enabled.
    # Since v0.50.0, the default value has been changed to true, and the first custom byte is disabled by default.
    disable_custom_tls_first_byte = true
    
    # Enable golang pprof handlers in admin listener.
    # Admin port must be set first.
    pprof_enable = false
    
    # 'ssh' is the unique proxy name
    # if user in [common] section is not empty, it will be changed to {user}.{proxy} such as 'your_name.ssh'
    [ssh]
    # tcp | udp | http | https | stcp | xtcp, default is tcp
    type = tcp
    local_ip = 127.0.0.1
    local_port = 22
    # limit bandwidth for this proxy, unit is KB and MB
    bandwidth_limit = 1MB
    # where to limit bandwidth, can be 'client' or 'server', default is 'client'
    bandwidth_limit_mode = client
    # true or false, if true, messages between frps and frpc will be encrypted, default is false
    use_encryption = false
    # if true, message will be compressed
    use_compression = false
    # remote port listen by frps
    remote_port = 6001
    # frps will load balancing connections for proxies in same group
    group = test_group
    # group should have same group key
    group_key = 123456
    # enable health check for the backend service, it support 'tcp' and 'http' now
    # frpc will connect local service's port to detect it's healthy status
    health_check_type = tcp
    # health check connection timeout
    health_check_timeout_s = 3
    # if continuous failed in 3 times, the proxy will be removed from frps
    health_check_max_failed = 3
    # every 10 seconds will do a health check
    health_check_interval_s = 10
    # additional meta info for each proxy
    meta_var1 = 123
    meta_var2 = 234
    
    [ssh_random]
    type = tcp
    local_ip = 127.0.0.1
    local_port = 22
    # if remote_port is 0, frps will assign a random port for you
    remote_port = 0
    
    # if you want to expose multiple ports, add 'range:' prefix to the section name
    # frpc will generate multiple proxies such as 'tcp_port_6010', 'tcp_port_6011' and so on.
    [range:tcp_port]
    type = tcp
    local_ip = 127.0.0.1
    local_port = 6010-6020,6022,6024-6028
    remote_port = 6010-6020,6022,6024-6028
    use_encryption = false
    use_compression = false
    
    [dns]
    type = udp
    local_ip = 114.114.114.114
    local_port = 53
    remote_port = 6002
    use_encryption = false
    use_compression = false
    
    [range:udp_port]
    type = udp
    local_ip = 127.0.0.1
    local_port = 6010-6020
    remote_port = 6010-6020
    use_encryption = false
    use_compression = false
    
    # Resolve your domain names to [server_addr] so you can use http://web01.yourdomain.com to browse web01 and http://web02.yourdomain.com to browse web02
    [web01]
    type = http
    local_ip = 127.0.0.1
    local_port = 80
    use_encryption = false
    use_compression = true
    # http username and password are safety certification for http protocol
    # if not set, you can access this custom_domains without certification
    http_user = admin
    http_pwd = admin
    # if domain for frps is frps.com, then you can access [web01] proxy by URL http://web01.frps.com
    subdomain = web01
    custom_domains = web01.yourdomain.com
    # locations is only available for http type
    locations = /,/pic
    # route requests to this service if http basic auto user is abc
    # route_by_http_user = abc
    host_header_rewrite = example.com
    # params with prefix "header_" will be used to update http request headers
    header_X-From-Where = frp
    health_check_type = http
    # frpc will send a GET http request '/status' to local http service
    # http service is alive when it return 2xx http response code
    health_check_url = /status
    health_check_interval_s = 10
    health_check_max_failed = 3
    health_check_timeout_s = 3
    
    [web02]
    type = https
    local_ip = 127.0.0.1
    local_port = 8000
    use_encryption = false
    use_compression = false
    subdomain = web02
    custom_domains = web02.yourdomain.com
    # if not empty, frpc will use proxy protocol to transfer connection info to your local service
    # v1 or v2 or empty
    proxy_protocol_version = v2
    
    [plugin_unix_domain_socket]
    type = tcp
    remote_port = 6003
    # if plugin is defined, local_ip and local_port is useless
    # plugin will handle connections got from frps
    plugin = unix_domain_socket
    # params with prefix "plugin_" that plugin needed
    plugin_unix_path = /var/run/docker.sock
    
    [plugin_http_proxy]
    type = tcp
    remote_port = 6004
    plugin = http_proxy
    plugin_http_user = abc
    plugin_http_passwd = abc
    
    [plugin_socks5]
    type = tcp
    remote_port = 6005
    plugin = socks5
    plugin_user = abc
    plugin_passwd = abc
    
    [plugin_static_file]
    type = tcp
    remote_port = 6006
    plugin = static_file
    plugin_local_path = /var/www/blog
    plugin_strip_prefix = static
    plugin_http_user = abc
    plugin_http_passwd = abc
    
    [plugin_https2http]
    type = https
    custom_domains = test.yourdomain.com
    plugin = https2http
    plugin_local_addr = 127.0.0.1:80
    plugin_crt_path = ./server.crt
    plugin_key_path = ./server.key
    plugin_host_header_rewrite = 127.0.0.1
    plugin_header_X-From-Where = frp
    
    [plugin_https2https]
    type = https
    custom_domains = test.yourdomain.com
    plugin = https2https
    plugin_local_addr = 127.0.0.1:443
    plugin_crt_path = ./server.crt
    plugin_key_path = ./server.key
    plugin_host_header_rewrite = 127.0.0.1
    plugin_header_X-From-Where = frp
    
    [plugin_http2https]
    type = http
    custom_domains = test.yourdomain.com
    plugin = http2https
    plugin_local_addr = 127.0.0.1:443
    plugin_host_header_rewrite = 127.0.0.1
    plugin_header_X-From-Where = frp
    
    [secret_tcp]
    # If the type is secret tcp, remote_port is useless
    # Who want to connect local port should deploy another frpc with stcp proxy and role is visitor
    type = stcp
    # sk used for authentication for visitors
    sk = abcdefg
    local_ip = 127.0.0.1
    local_port = 22
    use_encryption = false
    use_compression = false
    # If not empty, only visitors from specified users can connect.
    # Otherwise, visitors from same user can connect. '*' means allow all users.
    allow_users = *
    
    # user of frpc should be same in both stcp server and stcp visitor
    [secret_tcp_visitor]
    # frpc role visitor -> frps -> frpc role server
    role = visitor
    type = stcp
    # the server name you want to visitor
    server_name = secret_tcp
    sk = abcdefg
    # connect this address to visitor stcp server
    bind_addr = 127.0.0.1
    # bind_port can be less than 0, it means don't bind to the port and only receive connections redirected from
    # other visitors. (This is not supported for SUDP now)
    bind_port = 9000
    use_encryption = false
    use_compression = false
    
    [p2p_tcp]
    type = xtcp
    sk = abcdefg
    local_ip = 127.0.0.1
    local_port = 22
    use_encryption = false
    use_compression = false
    # If not empty, only visitors from specified users can connect.
    # Otherwise, visitors from same user can connect. '*' means allow all users.
    allow_users = user1, user2
    
    [p2p_tcp_visitor]
    role = visitor
    type = xtcp
    # if the server user is not set, it defaults to the current user
    server_user = user1
    server_name = p2p_tcp
    sk = abcdefg
    bind_addr = 127.0.0.1
    # bind_port can be less than 0, it means don't bind to the port and only receive connections redirected from
    # other visitors. (This is not supported for SUDP now)
    bind_port = 9001
    use_encryption = false
    use_compression = false
    # when automatic tunnel persistence is required, set it to true
    keep_tunnel_open = false
    # effective when keep_tunnel_open is set to true, the number of attempts to punch through per hour
    max_retries_an_hour = 8
    min_retry_interval = 90
    # fallback_to = stcp_visitor
    # fallback_timeout_ms = 500
    
    [tcpmuxhttpconnect]
    type = tcpmux
    multiplexer = httpconnect
    local_ip = 127.0.0.1
    local_port = 10701
    custom_domains = tunnel1
    # route_by_http_user = user1
    

第三步:启动服务

linux环境下启动服务,需要先把运行文件添加可执行权限。
例如我的文件实在root文件夹中,我需要搭建frp服务端,那么待设置好服务端配置文件(frps.ini)后执行以下命令即可:

cd /root
chmod +x frps
nohup ./frps -c ./frps.ini &

执行成功后,会显示frp的进程号码。你也可以通过命令来查看frps运行的进程编号:ps -e | grep frps

在windows环境下则是以管理员身份运行cmd命令提示符。进入相应的目录后,运行命令即可:
frps -c frps.ini &

关于frp管理的优化设置

注:现官方已提供systemd服务配置文件,可直接使用。
debian8.0,或者是centos7.0以上的版本,服务都是基于systemd的方式进行管理的。frp通过设置后也可以实现systemd的方式进行管理,这样我们就可以通过systemctl命令来进行服务的统一管理,同时通过这样的设置也可以将frp服务加入开机自启动。

  1. 将frp设置成linux系统的服务,基于systemd方式管理
    编写frps.service文件:
    vi /usr/lib/systemd/system/frps.service
    内容如下:

    [Unit]
    Description=Frp Server Service
    After=network.target
    
    [Service]
    Type=simple
    User=nobody
    Restart=on-failure
    RestartSec=5s
    ExecStart=/usr/bin/frps -c /etc/frp/frps.ini
    
    [Install]
    WantedBy=multi-user.target
    

    编写frpc.service文件:
    vi /usr/lib/systemd/system/frps.service
    内容如下:

    [Unit]
    Description=Frp Client Service
    After=network.target
    
    [Service]
    Type=simple
    User=nobody
    Restart=on-failure
    RestartSec=5s
    ExecStart=/usr/bin/frpc -c /etc/frp/frpc.ini
    ExecReload=/usr/bin/frpc reload -c /etc/frp/frpc.ini
    
    [Install]
    WantedBy=multi-user.target
    
  2. 将frp设置成开机自启动

    #frps
    systemctl enable frps
    systemctl start frps
    
    #frpc
    systemctl enable frpc
    systemctl start frpc
    

    Frp到此就配置完了。

附:个人参考配置

1、HTTP及TCP端口映射配置参考

  • 服务器端:

    [common]
    bind_addr = 0.0.0.0             //绑定地址
    bind_port = 8888                //TCP绑定端口
    bind_udp_port = 8888            //UDP绑定端口
    kcp_bind_port = 8888            //KCP绑定端口
    vhost_http_port = 80            //HTTP代理端口
    vhost_https_port = 443          //HTTPS代理端口
    dashboard_addr = 0.0.0.0        //仪表盘地址
    dashboard_port = 10000          //仪表盘端口
    dashboard_user = admin          //仪表盘用户名
    dashboard_pwd = admin           //仪表盘密码
    token = 123456                  //连接密码
    subdomain_host = test.com       //子域名使用的主机名
    
  • 客户端:

    [common]
    server_addr = 172.16.100.100    //服务器地址
    server_port = 8888              //服务器绑定端口
    token = 123456                  //特权模式密码
    tls_enable = true               //加密传输     
    admin_addr = 127.0.0.1          //客户端Web地址
    admin_port = 7400               //Web访问端口
    admin_user = admin              //Web访问账户
    admin_pwd = admin               //Web访问密码
    user = your_name                //用户名,设置后代理将显示为 <用户名.代理名>
    
    [web]                           //服务名称(自定义)
    local_ip = 127.0.0.1            //本机ip
    type = http                     //链路类型
    local_port = 80                 //本机端口
    subdomain = web                 //服务端为test.com,故此处子域名为web.test.com
    custom_domains = demo.com       //自定义访问域名,多个使用,分割
    use_compression = true          //使用压缩
    use_encryption = true           //使用加密
    
    [ssh]
    local_ip = 127.0.0.1
    type = tcp
    local_port = 22
    remote_port = 9000
    use_compression = true
    use_encryption = true
    

    注:具体参数请根据需要配置。

2、XTCP端口映射配置参考(P2P)

官方说明:https://gofrp.org/docs/features/xtcp/
官方示例:https://gofrp.org/docs/examples/xtcp/

  • 服务器端:

    [common]
    bind_addr = 0.0.0.0             #绑定地址
    bind_port = 8888                #TCP绑定端口
    bind_udp_port = 8888            #UDP绑定端口
    kcp_bind_port = 8888            #KCP绑定端口
    vhost_http_port = 80            #HTTP代理端口
    vhost_https_port = 443          #HTTPS代理端口
    dashboard_addr = 0.0.0.0        #仪表盘地址
    dashboard_port = 10000          #仪表盘端口
    dashboard_user = admin          #仪表盘用户名
    dashboard_pwd = admin           #仪表盘密码
    token = 123456                  #连接密码
    subdomain_host = test.com       #子域名使用的主机名
    
  • 客户端(被访问):

    [common]
    server_addr = 172.16.100.100    #服务器地址
    server_port = 8888              #服务器绑定端口
    token = 123456                  #特权模式密码
    tls_enable = true               #加密传输     
    user = your_name                #用户名,设置后代理将显示为 <用户名.代理名>
    
    [p2p_ssh]
    type = xtcp
    role = visitor              #角色, 这里是 xtcp 服务端
    sk = abcdef
    local_ip = 127.0.0.1
    local_port = 22
    
  • 客户端(访问者):

    [common]
    server_addr = 172.16.100.100    #服务器地址
    server_port = 8888              #服务器绑定端口
    token = 123456                  #特权模式密码
    tls_enable = true               #加密传输     
    user = your_name                #用户名,设置后代理将显示为 <用户名.代理名>
    
    [p2p_ssh_vistor]
    type = xtcp     
    role = visitor              #角色, 这里是 xtcp 访问者
    server_name = p2p_ssh       #要访问的 xtcp 代理的名字
    sk = abcdef                 #访问密码,两个客户端需一致
    bind_addr = 127.0.0.1
    bind_port = 2222            #绑定本地端口用于访问上文p2p_ssh服务
    keep_tunnel_open = true     #需要自动保持隧道打开时,设置为 true
    

    注:具体参数请根据需要配置。

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 203,230评论 5 476
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 85,261评论 2 380
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 150,089评论 0 336
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 54,542评论 1 273
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 63,542评论 5 365
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 48,544评论 1 281
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 37,922评论 3 395
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 36,578评论 0 257
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 40,816评论 1 296
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 35,576评论 2 320
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 37,658评论 1 329
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 33,359评论 4 318
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 38,937评论 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 29,920评论 0 19
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 31,156评论 1 259
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 42,859评论 2 349
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 42,381评论 2 342

推荐阅读更多精彩内容