|Operating System||Microsoft Windows 98 / NT 4.0 / 2000 / XP
Linux, FreeBSD, Solaris
Light-weight and fast Tunnel is suitable for solving multiple problems related to Internet security and infrastructure.
It can be used as a SMTP proxy, as a cascade for HTTP, HTTPS, SOCKS or other kinds of proxies.
Also with Tunnel you can hide your server from hacker attacks.
It is available for most widely spread operating systems – Unix like ones and Windows.
The technology used in Tunnel is also known as:
- TCP Mapped Link
- TCP Port Map
- TCP Redirector
- TCP Tunnel
Encryption and compression
Tunnel can encrypt and compress the traffic. This way it can be used to secure communication between your computers.
1. Encrypting Tunnel
- Setup two instances of the Tunnel on two machines – TA and TB.
- Configure TA to encrypt the traffic to TB.
- Configure TB to encrypt the traffic to TA.
- Configure TB to connect to your service or application.
- Configure your application to connect to TA. From the application point of view it looks like the service is running on TA.
2. SMTP Proxy
- Setup the Tunnel to point to the SMTP server of your Internet Service Provider (or any other).
- Setup your e-mail client to use the Tunnel as SMTP server instead of ISP’s one.
3. Cascade to HTTP, HTTPS or SOCKS Proxy
- Setup the Tunnel to point to working proxy of one of the described types.
- Setup your applications to use Tunnel as proxy (of corresponding type)
4. Use to open a channel – This scheme is used when your computer is behind a firewall/proxy and have no direct Internet Access. But you want to open a channel so your computer will be able to share services to Internet. For example you want to run a Web server on your computer or want to give Telnet access or want your computer to be accessible by some remote control applications (e.g. VNC, Windows Terminal Services etc.)
- Setup the Tunnel to point to your computer to the appropriate service port (web server-port 80, Telnet-port 23, VNC-port 5900 etc.).
- Point the client applications to connect the Tunnel.
5. Server Hiding – This scheme is used when you want to hide your server, so it will be inaccessible from the Internet, and protected from hacker attacks.
- Obtain a server hosting somewhere in the Internet.
- Install the Tunnel on this server and setup it to point to the real server.
- Register in DNS the IP address of the hosting computer where the Tunnel is running.
6. There are also many more possibilities and applications of the Tunnel.
Different filters, compression and other algorithms can be integrated into it depending your exact requirements.
Contact D-Tunnel and we will discuss your needs and will suggest proper solution.