Network access mapping

Network access mapping

If the project is carried out on a computer deployment, mapping out a network access, others can access the computer program deployed in the above by phone.

1, login access

URL: http: //www.ngrok.cc/

[Image dump the chain fails, the source station may have security chain mechanism, it is recommended to save the picture down uploaded directly (img-dg6LpC8a-1585374025700) (assets / 1585203807705.png)]

2, the opening of the tunnel

[Image dump the chain fails, the source station may have security chain mechanism, it is recommended to save the picture down uploaded directly (img-MVZ2WWUL-1585374025702) (assets / 1585204539064.png)]

3, download the tools for connection

[Image dump the chain fails, the source station may have security chain mechanism, it is recommended to save the picture down uploaded directly (img-lUkiAIuZ-1585374025702) (assets / 1585204085636.png)]

[Image dump the chain fails, the source station may have security chain mechanism, it is recommended to save the picture down uploaded directly (img-awgYLCzz-1585374025703) (assets / 1585204316035.png)]

The connection is successful display

[Image dump the chain fails, the source station may have security chain mechanism, it is recommended to save the picture down uploaded directly (img-mi0CrHXZ-1585374025705) (assets / 1585204396853.png)]

Published 29 original articles · won praise 0 · Views 2242

Guess you like

Origin blog.csdn.net/rootDream/article/details/105160032
Recommended