Home Server Access

Access home devices remotely without port forwarding.

Access Home NAS

Expose your NAS web interface:

bash
drip http 5000 -a 192.168.1.50 -n nas -d

Access from anywhere: https://nas.tunnel.example.com

Popular NAS systems:

  • Synology DSM: drip http 5000 -a 192.168.1.50 -n synology -d
  • QNAP QTS: drip http 8080 -a 192.168.1.51 -n qnap -d
  • TrueNAS: drip http 80 -a 192.168.1.52 -n truenas -d

Remote SSH Access

Expose SSH for remote access:

bash
drip tcp 22 -d

Connect from anywhere:

bash
ssh user@tunnel.example.com -p <assigned-port>

For better security, restrict to your IP:

bash
drip tcp 22 --allow-ip YOUR_PUBLIC_IP -d

Home Automation

Expose Home Assistant or similar:

bash
drip http 8123 -a 192.168.1.100 -n home -d

Other home automation systems:

  • OpenHAB: drip http 8080 -a 192.168.1.100 -n openhab -d
  • Domoticz: drip http 8080 -a 192.168.1.100 -n domoticz -d
  • Node-RED: drip http 1880 -a 192.168.1.100 -n nodered -d

Security Camera Access

Access your camera system remotely:

bash
drip http 8080 -a 192.168.1.200 -n cameras --allow-ip YOUR_IP -d

Plex Media Server

Share your Plex server:

bash
drip http 32400 -a 192.168.1.50 -n plex -d

Jellyfin / Emby

bash
drip http 8096 -a 192.168.1.50 -n jellyfin -d

Pi-hole Admin

Access Pi-hole dashboard remotely:

bash
drip http 80 -a 192.168.1.53 -n pihole --allow-ip YOUR_IP -d

Tips for Home Server

  1. Use daemon mode (-d) for persistent tunnels
  2. Restrict access with --allow-ip for sensitive services
  3. Use memorable subdomains for easy access
  4. Set up on boot using systemd or cron:
bash
# Add to crontab
@reboot /usr/local/bin/drip http 5000 -a 192.168.1.50 -n nas -d

Or create a systemd user service:

ini
[Unit]
Description=Drip Tunnel for NAS
After=network.target

[Service]
ExecStart=/usr/local/bin/drip http 5000 -a 192.168.1.50 -n nas
Restart=always

[Install]
WantedBy=default.target