Openwrt’s intranet penetration through N1 box with net cloud
Soft router [](http://neiwangchuantou.cn/arc…Chapter link)
N1 (already swiped into arbian) uses docker to create openwrt container as side route.
My intranet IP information [](http://neiwangchuantou.cn/arc…Chapter link)
Intranet IP varies from person to person. Here are my own settings
Armbian:192.168.123.2
Openwrt:192.168.123.10
Ideas [](http://neiwangchuantou.cn/arc…Chapter link)
The network cloud penetration is deployed in the armbian of N1 to penetrate the intranet of 192.168.123.10:80.
Why don’t we just deploy cloud piercing on openwrt?
Because openwrt under the N1 box is often updated, if it is deployed on openwrt, it is too cumbersome to reload the network after each update.
However, the Armen system of N1 box has low update frequency and more stable operation. Through accessing openwrt in N1 intranet to complete network cloud penetration deployment, the network cloud penetration service can run stably for a long time
1 – open online cloud service [](http://neiwangchuantou.cn/arc…Chapter link)
1.1 – accessWorking platform of network cloud penetration, selectTunnel opening
, purchase according to the demand and complete the payment.
My discount code:fzyhpv
2 – configure tunnel [](http://neiwangchuantou.cn/arc…Chapter link)
2.1 – accessWorking platform of network cloud penetration-Tunnel opening / management
Edit tunnel:
Intranet address
: fill in the address of openwrt in Intranet
Intranet port
: 80
(used to access the openwrt background control panel)
Penetration protocol
: TCP
2.2 – copy token, where token is5p6cypqw
3 – install net cloud piercing in N1 box [](http://neiwangchuantou.cn/arc…Chapter link)
3.1 – SSH login intranet: arbian:ssh [email protected]
3.2 – Download cloud wear Linux arm version:curl -O http://xiaomy.net/download/linux/wyc_linux_arm
3.3 – give the program executable permission:chmod -R 777 ./wyc_linux_arm
4 – start network cloud penetration service [](http://neiwangchuantou.cn/arc…Chapter link)
4.1 – login to the intranet via SSHssh [email protected]
4.2 – start cloud piercing
There are two ways to start cloud piercing
Method 1: input token after running network cloud penetration(http://neiwangchuantou.cn/arc…Chapter link)
Execute the order./wyc_linux_arm
Enter the token according to the prompt
Method 2: fill in the token in the start command(http://neiwangchuantou.cn/arc…Chapter link)
Execute the order./wyc_ linux_ Arm - token = token number
See “login succeeded, now you can visit” xxxx.xiaomy.net:12345 , which will be directly mapped to your local 192.168.123.10:80 · “
Indicates that the penetration has been successful. You can enter the openwrt management background through the prompted domain name.
27A50F14-6F8E-4325-B2C2-64824D5D3CBE
At this time, the network cloud service runs in the front desk of armbian and interrupts the SSH connection orctrl + c
Will terminate the intranet penetration process. If you want the penetration service to run stably, you need to set the service to run in the background
5 – background operation network cloud service [](http://neiwangchuantou.cn/arc…Chapter link)
5.1 – background start command:nohup /root/wyc_ linux_ Arm - token = token >/ wycout.txt 2>&1 &
5.2 – view startup information:cat ./wycout.txt
5.3 – view network cloud piercing process ID:ps -ef | grep wyc_linux_arm
Stop background service:Kill process ID
Just now our process ID is15537
, corresponding, command:kill 15537
6 – set the network cloud to boot automatically and run in the background [](http://neiwangchuantou.cn/arc…Chapter link)
6.1 – enter crontab toolcrontab -e
6.2 – add this command at the bottom (please fill in the token yourself)
@reboot nohup /root/wyc_ linux_ Arm - token = token >/ wycout.txt 2>&1 &
After filling in, save the settings and exit
Conclusion [](http://neiwangchuantou.cn/arc…Chapter link)
Through the above settings, you can achieve stable intranet penetration of your router background.