Frp installation and deployment within the network penetration tools Centos7

First, the installation
1, the source address
https://github.com/fatedier/frp
2, Chinese documents
https://github.com/fatedier/frp/blob/master/README_zh.md
3, installation and deployment
# all releases Download address
https://github.com/fatedier/frp/releases
# installation command (server and client execution)
wget https://github.com/fatedier/frp/releases/download/v0.29.0/frp_0.29.0 _linux_amd64.tar.gz
the tar -xvf frp_0.29.0_linux_amd64.tar.gz -C / usr / local /
CD / usr / local /
Music Videos frp_0.29.0_linux_amd64 FRP
CD FRP

# Frpc and frpc.ini delete two files on the server
rm -f frpc frpc.ini

# Delete frps and frps.ini two files on the server
rm -f frps frps.ini

Second, the configuration file

1, the client file modification frps.ini

# Add the following contents

[common]

bind_addr = 0.0.0.0

bind_port = 10000

bind_udp_port = 10001

vhost_http_port = 10003

vhost_https_port = 443

#kcp_bind_port = 10000

token = Abc # 123 & 2wsx # token and a client speech

authentication_timeout = 900

max_pool_count = 20

## Logging

log_file = /var/log/frps.log

log_level = info

log_max_days = 3

## port whitelist

allow_ports = 10001,10048,10058,10076,10078,11110,11222,11112,11122,11123

## dashboard abuse test panel

dashboard_port = 10002

dashboard_user = admin

dashboard_pwd = admin#123@zbc

2, client modifies a file frpc.ini

# Add the following contents

[common]

#server_addr = 101.65.43.134

server_addr = asdf.test.com # this domain explanation to the server

server_port = 10000

#protocol = kcp

## specifies the protocol type to be used, the default type is TCP

tls_enable = true

token = Abc # 123 & 2wsx # token server and a speech

pool_count = 1

## Logging

log_file = /var/log/frpc.log

log_level = info

log_max_days = 3

## Configuring client thermal load

admin_addr = 127.0.0.1

admin_port = 7400

admin_user = admin

admin_pwd = admin

## weave language client extranet connection

[range:ccwork_tcp]

type = tcp

local_ip = 192.168.63.140

local_port = 10001,10048,10058,10076,10078,11110,11222,11112,11122,11123

remote_port = 10001,10048,10058,10076,10078,11110,11222,11112,11122,11123

use_encryption = true

use_compression = true

Third, the service is set to systemd

1, the server frps Service

we /etc/systemd/system/frps.service

# Add the following contents

[Unit]

Description=FRP Server Daemon

[Service]

Type=simple

ExecStartPre=-/sbin/setcap cap_net_bind_service=+ep /usr/local/frp/frps

ExecStart=/usr/local/frp/frps -c /usr/local/frp/frps.ini

Restart=always

RestartSec=20s

User=nobody

PermissionsStartOnly=true

[Install]

WantedBy=multi-user.target

2, client service frpc

we /etc/systemd/system/frpc.service

# Add the following contents

[Unit]

Description=FRP Client Daemon

[Service]

Type=simple

ExecStartPre=-/sbin/setcap cap_net_bind_service=+ep /usr/local/frp/frpc

ExecStart=/usr/local/frp/frpc -c /usr/local/frp/frpc.ini

Restart=always

RestartSec=20s

User=nobody

PermissionsStartOnly=true

[Install]

WantedBy=multi-user.target

3, management services

#Server

systemctl daemon-reload

systemctl enable frps

systemctl start Progress

systemctl restart Progress

systemctl stop Progress

systemctl status Progress

Client #

systemctl daemon-reload

systemctl enable frpc

systemctl start frpc

systemctl restart frpc

systemctl stop frpc

systemctl status frpc

Fourth, these cloud vendors open firewall ports

443,10000-10003,10001,10048,10058,10076,10078,11110,11222,11112,11122,11123

Fifth, the local host server ports open (or shut down the local firewall)

443,10000-10003,10001,10048,10058,10076,10078,11110,11222,11112,11122,11123

#Excuting an order

systemctl start firewalld

systemctl enable firewalld

firewall-cmd –zone=public –add-port=443/tcp –permanent

firewall-cmd –zone=public –add-port=10000-10003/tcp –permanent

firewall-cmd –zone=public –add-port=10048/tcp –permanent

firewall-cmd –zone=public –add-port=10058/tcp –permanent

firewall-cmd –zone=public –add-port=10076/tcp –permanent

firewall-cmd –zone=public –add-port=10078/tcp –permanent

firewall-cmd –zone=public –add-port=11110/tcp –permanent

firewall-cmd –zone=public –add-port=11222/tcp –permanent

firewall-cmd –zone=public –add-port=11112/tcp –permanent

firewall-cmd –zone=public –add-port=11122/tcp –permanent

firewall-cmd –zone=public –add-port=11123/tcp –permanent

firewall-cmd –reload

Computer rental hang idle resources to earn money electricity
use of idle computer resources to earn pocket money (for students, housewives)
Online generated outside the chain tool (International Edition)
generated on-line outside the chain tool (Chinese version)

Published 16 original articles · won praise 2 · Views 412

Guess you like

Origin blog.csdn.net/momoringmok/article/details/104898314