1. intro

s dd h p
| |  | |
| |  | +---- portnr   (0-9)
| |  +------ hostnr   (1-9)
| +--------- domainnr (01-99)
+----------- seqnr    (1-5)

seqnr

s type

1

host

2

network

3

printer

4

cam/icom

5

guest

portnr

p port service

1

80

http

2

22

ssh

3

443

https

4

389

ldap

5

5000

synology

6

88

foscam

7

554

rtsp

8

3389

rdp

9

5900

vnc

0

sample

portnr ipaddr port service

10311

10.3.1.1

80

router http

10321

10.3.1.2

80

srv002 http

10322

10.3.1.2

22

srv002 ssh

10355

10.3.1.5

5000

nas005 synology

30321

10.3.1.21

80

printer

40361

10.3.1.61

cam061

camera port 80

40367

10.3.1.61

cam061

camera port 554

2. ssh client

ssh -f -N -T -R 10321:localhost:10321 d01cid.ddns.net
-R reverse the ssh tunnel from the localport 22 to the forwarded port 21400
-f tells ssh to background itself after it authenticates, so you don't have to
   sit around running something on the remote server for the tunnel to remain alive.
-N says that you want an SSH connection, but you don't actually want to run
   any remote commands.
-T disables pseudo-tty allocation, which is appropriate because
   you're not trying to create an interactive shell.
-o ServerAliveInterval="180"
-o ServerAliveCountMax="3"

3. rtunnel

/etc/3proxy.cfg
Tip if nothing found in config file, following convention will be used:
s dd h p
| |  | |
| |  | +---- 2
| |  +------ last character of hostname
| +--------- domainnr (01-99)
+----------- 5
Note sample 51292