Looking for something specific?
Page Tag-Cloud
Software Tag-Cloud
Building from Source
Open Source Definition
All Software
  Popular Tags
C Plus Plus
Source Code
Notable Members
Our Company
Copyright Information
Software EULA
Pre-Release EULA
Privacy Policy
Make Contact
Downloads   45
User Rating   (Rate)
Last Updated   4/2/2024
License   Apache License
- Download -
View all Releases
Recommended Release
Version   1.0.0
Date   4/2/2024
Status   Stable Stable software is believed to be stable and ready for production use.

This software is open source. You can obtain the latest source code from the GitHub repository or browse the releases for the source code associated with a specific release. If you make any changes which you feel improves this application, please let us know via our Contact Page.


NetTunnel is a TCP/IP proxy that is designed to work from behind firewalls where the rules can not be altered.


This is accomplished by installing the software at each location where the connection needs to be made FROM and TO. You will then create an OUTBOUND tunnel at the location that is behind a firewall and create an INBOUND tunnel at the location where you can receive an inbound connection (such as ay home). The service installation with the OUTBIUND tunnel configuration will make a outgoing connection to the other service. Once the tunnel is connected you can manage endpoints which as nothing more than a listening port that will pump the data through the tunnel, exit at the other service installation and make a connection to the configured endpoint address and port.

Operational concept


Note that in the diagram above, that we are routing to the remote server, but we do do not have its IP address nor do we have any inbound firewall rules defined. All data exchanged between the INBOUND and OUTBOUND endpoints is routed through the encrypted and compressed tunnel to the corresponding endpoint. That tunnel was established as an outbound connection FROM the remote server.

3rd and subsequent endpoint hops

If you are in a situation where both endpoints are behind firewalls, you can get creative and have both endpoint endpoint tunnels reachout to a 3rd (or 4th, or 5th....) location which can accept incomming connections from both sites.


  • All configuration and handshakes are done though plain ol' HTTPS, we here at NetworkDLS like our proprietary (and better) frameworks, but we use HTTPS here as to not freakout any outbound firewall rules.
  • We use diffie hellman to create and exchange a 960bit key for each tunnel at each startup.
  • All data exchanged though the tunnel encrypted using the NASCCL symmetric cipher.
  • All data exchanged though the tunnel is compressed using the deflate algorithm.
  • The UI connectes to standard HTTPS endpoints using 2048bit asymmetric encryption.

Recent Releases:
 1.0.0    0.4.0    0.1.0  

 .NET    C-Sharp    Firewall Avoidance    Firewall Bypass    Flagship    Internet    IPv4    IPV6    Networking    proxy    Proxy Server    Routing    Server    Showcase    Tcpip    Tunnel    Tunneling    Vpn    Winsock  

No comments currently exists for this software. Why don't you add one?
First Previous Next Last 

Copyright © 2024 NetworkDLS.
All rights reserved.
Privacy Policy | Our Company | Contact