Looking for something specific?
  Home
Home
Articles
Page Tag-Cloud
  Software
Software Tag-Cloud
Building from Source
Open Source Definition
All Software
  Popular Tags
Legacy
C Plus Plus
Source Code
Class
Cryptography
  Members
Login
Web-Email
Notable Members
  Official
Our Company
Copyright Information
Software EULA
GPL EULA
LGPL Eula
Pre-Release EULA
Privacy Policy
  Support
Make Contact
 
NetTunnel
Downloads   531
User Rating   (Rate)
Last Updated   12/10/2024
License   MIT License
- Download -
View all Releases
Recommended Release
Version   4.2.5
Date   12/10/2024
Status   Stable Stable software is believed to be stable and ready for production use.

This software is open source. You can obtain the latest source code from the GitHub repository or browse the releases for the source code associated with a specific release. If you make any changes which you feel improves this application, please let us know via our Contact Page.

NetTunnel

NetTunnel is a TCP/IP tool that is designed to allow ingress traversal through firewalls where the rules cannot be altered.

Screenshot 2024-06-11 165343

This is accomplished by installing the NetTunnel software at each location where the connection needs to be made FROM and TO. You will then create an OUTBOUND tunnel at the location that is behind a firewall, by doing so the NetTunnel software will reach out to the other remote installation and create an associated INBOUND tunnel. The INBOUND installation would be at a location where you can receive an inbound connection (such as home).

Once configured, the NetTunnel service installation with the OUTBOUND tunnel will make a outgoing connection to the other service.

Once the tunnel is connected you can add/manage endpoints, which are nothing more than a listening port that will pump data through the tunnel, exit at the other NetTunnel service installation and make a connection to the configured endpoint address and port.

Operational concept

image

Note that in the diagram above, that we are routing to the remote server, but we do not have its IP address nor do we have any inbound firewall rules defined. All data exchanged between the INBOUND and OUTBOUND endpoints is routed through the encrypted and compressed tunnel to the corresponding endpoint. That tunnel was established as an outbound connection FROM the remote server.

3rd and subsequent endpoint hops

If you are in a situation where both endpoints are behind firewalls, you can get creative and have both endpoint tunnels reach out to a 3rd (or 4th, or 5th....) location which can accept incoming connections from both sites and pipe data between them.

Notes

  • All configuration, handshakes and tunneling is completed through a single connection using ReliableMessaging.
  • Encryption keys are provided by diffie hellman to create and exchange a 1532bit key for each tunnel at each startup.
  • All data exchanged though the tunnel encrypted using the NASCCL symmetric cipher.
  • All data exchanged though the tunnel is compressed using the deflate algorithm.
  • The UI connects to standard tunnel service provider and inherits all the same encryption and compression benefits.
  • All endpoint configuration is stored to the NetTunnel user account so you can configure settings for others and limit their access.

Recent Releases:
 4.2.5    4.2.4    4.2.3    4.2.2    4.2.1    4.2.0    4.1.0    4.0.0    3.2.0    3.0.1  

Tags:
 .NET    C-Sharp    Firewall Avoidance    Firewall Bypass    Flagship    Internet    IPv4    IPV6    Net Tunnel    Networking    Port Forwarding    proxy    Proxy Server    Reverse Proxy Server    Routing    Server    Showcase    Tcpip    Tunnel    Tunneling    Vpn    Winsock  

No comments currently exists for this software. Why don't you add one?
First Previous Next Last 

 
Copyright © 2024 NetworkDLS.
All rights reserved.
 
Privacy Policy | Our Company | Contact