oray
  • Products
  • Downloads
  • Resources
  • Explore
  • Partners
  • Pricing
Products
  • AweSun Remote Desktop Control
  • AweSeed Intelligente Networking
  • AweShell NAT Traversal Expert
Downloads
  • AweSun Personal Edition
  • AweSeed Client
  • AweShell Client
Resources
  • Resources
Explore
  • Redeem Code
  • About Us
Partners
  • Partners
Pricing
  • AweSun Personal Plan
  • AweSeed Business Plan
  • AweShell Personal Plan
  • AweShell Business Plan
more
i18n
arrow
AI-translated page. Original content available in English.
Contact Us
Smart Hardware

AweSun

  • AweSun
  • AweSeed
  • AweShell
Search for this product
Search all.
  • Search all documents

Quick Start

Individual user

How do I initiate Remote Assistance with an identification code?

Unattended access your computer

What is a channel connection

Awesun Safety Remote Control Tutorial

Operation Help

Software application

Desktop application

How to Remote Files on Computer

Privacy screen

Multi-screen control Multi-screen

Handle Mapping

Intelligent hardware

Power-on hardware

Power-on socket/patch panel FAQ

Remote control without network

Resolution and refresh frequency supported by intelligent remote control devices

How to use intelligent remote control equipment remote boot

Common problems of intelligent remote control equipment

Software Manual

Windows

Windows personal edition manual

Android & iOS

Control terminal Android version manual

Control terminal iOS version manual

User Manual of AweSun Host for Android

Intelligent hardware

Other

Intelligent remote control mouse (Bluetooth version) manual

Power on socket C2 manual

Case Center

Scenario Case

Telecommuting

Awesun Helps Huawei Improve Collaboration Efficiency

Industry Cases

IT Internet

How do well-known game manufacturers build internal remote assistance systems with the help of Aweray Awesun?

Smart Transportation

Soft and hard integrated solution to build intranet operation and maintenance, Aweray Awesun privatization deployment empowers Zhejiang Zhongche.

Intelligent Manufacturing

How to build an efficient cross-border remote technical support system when the manufacturing industry is out to sea?

Solution

IT Operation and Maintenance

Support ZTE's new fulcrum server operating system to Aweray the localization of Awesun empowerment.

How can enterprises quickly build a remote IT operation and maintenance system to deal with holiday business?

How does the first-line commercial equipment operate efficiently? Starting from these four aspects

Tips for remote IT management: How to group a large number of IT equipment? How to set up fast grouping?

To deal with the four major problems of chain operation and maintenance, Aweray Awesun IT operation and maintenance solutions to empower the chain retail industry.

Telecommuting

Deal with these three pain points, 'painless' to build enterprise telecommuting system

The Dragon Boat Festival holiday business is not interrupted, and the enterprise telecommuting plan is deployed in three steps.

After the telecommuting system is set up, how to manage IT assets in an enterprise in a unified way?

Technical Support

No longer piecemeal, how do enterprises build platform-based technical support services?

Efficient assistance, professional image, customer-oriented! Three aspects to build enterprise technical support professional reputation

How to ensure the security of remote control business? Analysis of the "whole process safety closed loop" system of Aweray Awesun

 


Cancel

Back to Home Page

Quick Start

 

Individual user

 

How do I initiate Remote Assistance with an identification code?

 

Unattended access your computer

 

What is a channel connection

 

Awesun Safety Remote Control Tutorial

 

Operation Help

 

Software application

 

Desktop application

 

How to Remote Files on Computer

 

Privacy screen

 

Multi-screen control Multi-screen

 

Handle Mapping

 

Intelligent hardware

 

Power-on hardware

 

Power-on socket/patch panel FAQ

 

Remote control without network

 

Resolution and refresh frequency supported by intelligent remote control devices

 

How to use intelligent remote control equipment remote boot

 

Common problems of intelligent remote control equipment

 

Software Manual

 

Windows

 

Windows personal edition manual

 

Android & iOS

 

Control terminal Android version manual

 

Control terminal iOS version manual

 

User Manual of AweSun Host for Android

 

Intelligent hardware

 

Other

 

Intelligent remote control mouse (Bluetooth version) manual

 

Power on socket C2 manual

 

Case Center

 

Scenario Case

 

Telecommuting

 

Awesun Helps Huawei Improve Collaboration Efficiency

 

Industry Cases

 

IT Internet

 

How do well-known game manufacturers build internal remote assistance systems with the help of Aweray Awesun?

 

Smart Transportation

 

Soft and hard integrated solution to build intranet operation and maintenance, Aweray Awesun privatization deployment empowers Zhejiang Zhongche.

 

Intelligent Manufacturing

 

How to build an efficient cross-border remote technical support system when the manufacturing industry is out to sea?

 

Solution

 

IT Operation and Maintenance

 

Support ZTE's new fulcrum server operating system to Aweray the localization of Awesun empowerment.

 

How can enterprises quickly build a remote IT operation and maintenance system to deal with holiday business?

 

How does the first-line commercial equipment operate efficiently? Starting from these four aspects

 

Tips for remote IT management: How to group a large number of IT equipment? How to set up fast grouping?

 

To deal with the four major problems of chain operation and maintenance, Aweray Awesun IT operation and maintenance solutions to empower the chain retail industry.

 

Telecommuting

 

Deal with these three pain points, 'painless' to build enterprise telecommuting system

 

The Dragon Boat Festival holiday business is not interrupted, and the enterprise telecommuting plan is deployed in three steps.

 

After the telecommuting system is set up, how to manage IT assets in an enterprise in a unified way?

 

Technical Support

 

No longer piecemeal, how do enterprises build platform-based technical support services?

 

Efficient assistance, professional image, customer-oriented! Three aspects to build enterprise technical support professional reputation

 

How to ensure the security of remote control business? Analysis of the "whole process safety closed loop" system of Aweray Awesun

 

Search for this product

Search all.

Home Page AweSun Intranet Penetration A Comprehensive Guide to Intranet Penetration Using Peanut Shell

A Comprehensive Guide to Intranet Penetration Using Peanut Shell

Update Date:2026-03-31 11:46:58

In today's interconnected world, the ability to access internal resources from remote locations is crucial for businesses and individuals alike. Whether it's managing a shared file server, testing a local web application, or running a game server, the need for secure and reliable access to internal networks is ever-increasing. One of the most effective solutions for achieving this is intranet penetration, and peanut shell stands out as a powerful tool in this domain. This article will provide a detailed guide on how to use Peanut Shell for intranet penetration, ensuring that you can set up and maintain a stable and secure connection to your internal resources.

Understanding Intranet Penetration

Intranet penetration, also known as port forwarding or tunneling, is a technique that allows external devices to access internal resources within a private network. This is particularly useful when your network is behind a NAT (Network Address Translation) or a firewall, which typically blocks direct access from the outside. By setting up a tunnel, you can bypass these restrictions and ensure that your internal resources are reachable from any location.

How Peanut Shell Works

Peanut Shell simplifies the process of intranet penetration by providing an easy-to-use interface and robust features. When you install and configure the Peanut Shell client on your internal server, it establishes a secure connection to the Peanut Shell cloud service. The cloud service then acts as a relay, forwarding external traffic to your internal server through the established tunnel. This means that even without a public IP address or the ability to configure port forwarding on your router, you can still access your internal resources from anywhere in the world.

Setting Up Peanut Shell Intranet Penetration

Step 1: Install the Peanut Shell Client

To get started with Peanut Shell intranet penetration, the first step is to install the client software on your internal server. The installation process is straightforward and can be completed in a few minutes.

  1. Download the Client: Visit the Peanut Shell official website to download the latest version of the client software.

  2. Install the Client: Follow the installation instructions provided on the website to install the client on your server. Ensure that your server meets the minimum system requirements for running the Peanut Shell client.

Step 2: Log in and Activate the Intranet Penetration Feature

Once the client is installed, you need to log in to your Peanut Shell account and activate the intranet penetration feature.

  1. Log in to Your Account: Open the Peanut Shell client and log in using your credentials. If you don't have an account, you can create one for free on the official website.

  2. Activate Intranet Penetration: After logging in, activate the intranet penetration feature if it hasn't been activated already. This feature allows you to create and manage mappings between your internal and external networks.

Step 3: Add a New Mapping

Adding a new mapping is the core step in setting up intranet penetration. This involves configuring the parameters that will determine how external devices connect to your internal resources.

  1. Click the “+” Button: In the Peanut Shell client, click the “+” button to add a new mapping.

  2. Configure the Mapping Information:

    • Application Name: Give your mapping a descriptive name for easy identification.
    • Application Type: Choose the type of application you want to access (e.g., HTTP, TCP, UDP).
    • Internal Host: Enter the internal IP address of the device you want to access.
    • Internal Port: Enter the port number of the service running on the internal device.
    • External Domain: Select a domain from your account that will be used to access the internal resource from the outside.
    • External Port: Choose an external port number. For dynamic ports, Peanut Shell will automatically assign one.
    • Bandwidth: Set the bandwidth according to your account level or purchase additional bandwidth if needed.
    • Night Bandwidth: Optionally, enable night bandwidth to boost performance during off-peak hours.
    • Access Rules: Set up access control rules to enhance security. You can restrict access based on time, region, IP address, browser, and operating system.
  3. Save the Mapping: After configuring the mapping, click “Save” to apply the settings. The client will validate the configuration and establish the tunnel.

Step 4: Test the Connection

To ensure that your setup is working correctly, it's essential to test the connection from a remote location.

  1. Internal Connection: Test the connection within your local network using the internal IP address and port to ensure that the service is running and accessible.

  2. External Connection: Use the external domain and port to test the connection from a remote device. Open a web browser or use a suitable client to access the internal resource.

If everything is configured correctly, you should be able to access your internal resource without any issues. Peanut Shell provides a user-friendly interface for diagnosing and troubleshooting any problems that may arise during this process.

Example: Setting Up a Game Server

One of the most common use cases for intranet penetration is setting up a game server. Let's walk through an example of how to set up a Minecraft server using Peanut Shell.

  1. Install the Minecraft Server: Set up the Minecraft server on your internal machine and ensure it's running.

  2. Install Peanut Shell Client: Install the Peanut Shell client on the same machine.

  3. Log in to Peanut Shell: Log in to your Peanut Shell account and activate the intranet penetration feature.

  4. Add a New Mapping:

    • Application Name: “Minecraft Server”
    • Application Type: TCP
    • Internal Host: 192.168.1.100 (assuming this is your server's internal IP)
    • Internal Port: 25565 (Minecraft default port)
    • External Domain: Choose a domain from your Peanut Shell account
    • External Port: Use a dynamic port or a specific port if needed
    • Bandwidth: Set according to your account level
  5. Test the Server:

    • Local Test: Use another device on your local network to connect to the server using the internal IP and port.
    • Remote Test: Connect to the server from a remote device using the external domain and port.

Peanut Shell's reliability and ease of use make it an excellent choice for game server administrators who need to ensure that players can connect to the server from anywhere.

Enhancing Security

While intranet penetration is incredibly useful, it's important to prioritize security to protect your internal resources from unauthorized access.

  1. Access Control: Peanut Shell allows you to set up access control rules to restrict who can access your internal resources. You can specify allowed IP addresses, regions, and even the time of day when access is permitted.

  2. Encryption: All data transmitted through the Peanut Shell tunnel is encrypted, ensuring that sensitive information remains secure.

  3. Monitoring: Regularly monitor the access logs to detect any suspicious activity and take necessary actions to secure your resources.

By implementing these security measures, you can enjoy the benefits of intranet penetration without compromising the safety of your internal network.

Benefits of Using Peanut Shell

Peanut Shell offers several advantages over traditional methods of accessing internal resources:

  • Simplicity: The user interface is intuitive, making it easy to set up and manage mappings without technical expertise.

  • Stability: Once configured, the connection remains stable, ensuring consistent access to your internal resources.

  • No Public IP Required: You don't need a public IP address or the ability to configure port forwarding on your router.

  • Security: Built-in access control and encryption features provide a secure environment for your internal resources.

  • Cost-Effective: The free tier of Peanut Shell includes essential features, and you can upgrade to premium plans for additional features as needed.

For businesses and individuals looking for a reliable and secure way to access internal resources, Peanut Shell is a top choice.

Conclusion

Intranet penetration is a vital tool for anyone who needs to access internal resources from remote locations. Peanut Shell simplifies this process with its user-friendly interface and robust features, making it accessible to both technical and non-technical users. By following the steps outlined in this guide, you can set up a secure and reliable tunnel to your internal network, ensuring that you can maintain productivity and access necessary resources no matter where you are. Whether you're setting up a game server, managing a shared file server, or accessing an internal web application, Peanut Shell is a powerful and versatile solution that can meet your needs.

FAQ

Q:What is Intranet Penetration? A:Intranet penetration, also known as port forwarding or tunneling, is a technique that allows external devices to access internal resources within a private network. This is particularly useful when your network is behind a NAT or a firewall, which typically blocks direct access from the outside. By setting up a tunnel, you can bypass these restrictions and ensure that your internal resources are reachable from any location.

Q:How does Peanut Shell work for Intranet Penetration? A:Peanut Shell simplifies the process of intranet penetration by providing an easy-to-use interface and robust features. When you install and configure the Peanut Shell client on your internal server, it establishes a secure connection to the Peanut Shell cloud service. The cloud service then acts as a relay, forwarding external traffic to your internal server through the established tunnel. This means that even without a public IP address or the ability to configure port forwarding on your router, you can still access your internal resources from anywhere in the world.

Q:Can I use Peanut Shell without a public IP address? A:Yes, one of the key benefits of Peanut Shell is that it does not require a public IP address. You can set up intranet penetration using the Peanut Shell client and a domain name, which will be used to access your internal resources from the outside. This makes it an ideal solution for users who do not have control over their router settings or do not have a static public IP address.

Q:Is Peanut Shell secure? A:Peanut Shell provides several security features to protect your internal resources. All data transmitted through the Peanut Shell tunnel is encrypted, ensuring that sensitive information remains secure. Additionally, you can set up access control rules to restrict who can access your internal resources, specifying allowed IP addresses, regions, and even the time of day when access is permitted. Regularly monitoring the access logs can help you detect and address any suspicious activity.

Q:How do I test the connection after setting up Peanut Shell? A:To ensure that your setup is working correctly, you should test the connection from both internal and external locations. First, test the connection within your local network using the internal IP address and port to ensure that the service is running and accessible. Then, use the external domain and port to test the connection from a remote device. Open a web browser or use a suitable client to access the internal resource. If everything is configured correctly, you should be able to access your internal resource without any issues.

Next:

Understanding t...

Did the content of the document help you?

Yes
No

If you encounter product-related problems, you can consult Online customer service Ask for help.

Document Feedback

Mouse selected content, quick feedback problem

If you have doubts in the selected document, you can quickly feedback the problem and we will follow up.

Example:

Dandelion Router

In the router management interface,In the router management interface,

①DHCP:ON;

② IP address range: fill in the start and end address segments;

Document Feedback  Document Feedback

Okay, I got it

Related issues

· A Comprehensive Guide to Intranet Penetration Using Peanut Shell· Understanding Linux Intranet Penetration: A Comprehensive Guide· Exploring the Benefits of Intranet Penetration Services· Accessing Intranet Servers from the External Network· Understanding Intranet Penetration: A Comprehensive Guide· Router Intranet Penetration: Unlocking Seamless Network Connectivity

Other issues

· Dynamic DNS: Simplifying Network Management on Routers· Understanding the Benefits and Applications of Dynamic Domain Name System (DDNS)· A Comprehensive Guide to Intranet Penetration Using Peanut Shell· Understanding Dynamic DNS on Routers· Exploring the Benefits and Challenges of LAN External Network Access· AweShell: Simplifying IT Management with Innovative Solutions
Document Feedback

Introduction to this article

Understanding Intranet Penetration

How Peanut Shell Works

Setting Up Peanut Shell Intranet Penetration

Enhancing Security

Benefits of Using Peanut Shell

Conclusion

FAQ

Purchase
  • AweSun
  • AweSeed
  • AweShell
  • Smart Hardware
Downloads
  • AweSun Client
  • AweSeed Client
  • AweShell Client
About
  • Company Profile
  • Partners
  • Blog
Support
  • Resources
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • Cookies Policy
Copyright ©2026 AweRay PTE All Rights Reserved.
Purchase
  • AweSun
  • AweSeed
  • AweShell
  • Smart Hardware
Downloads
  • AweSun Client
  • AweSeed Client
  • AweShell Client
About
  • Company Profile
  • Partners
  • Blog
Support
  • Resources
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • Cookies Policy
Copyright ©2026 AweRay PTE All Rights Reserved.