Home Server Access
Access home devices remotely without port forwarding.
Access Home NAS
Expose your NAS web interface:
bash
drip http 5000 -a 192.168.1.50 -n nas -dAccess from anywhere: https://nas.tunnel.example.com
Popular NAS systems:
- Synology DSM:
drip http 5000 -a 192.168.1.50 -n synology -d - QNAP QTS:
drip http 8080 -a 192.168.1.51 -n qnap -d - TrueNAS:
drip http 80 -a 192.168.1.52 -n truenas -d
Remote SSH Access
Expose SSH for remote access:
bash
drip tcp 22 -dConnect from anywhere:
bash
ssh user@tunnel.example.com -p <assigned-port>For better security, restrict to your IP:
bash
drip tcp 22 --allow-ip YOUR_PUBLIC_IP -dHome Automation
Expose Home Assistant or similar:
bash
drip http 8123 -a 192.168.1.100 -n home -dOther home automation systems:
- OpenHAB:
drip http 8080 -a 192.168.1.100 -n openhab -d - Domoticz:
drip http 8080 -a 192.168.1.100 -n domoticz -d - Node-RED:
drip http 1880 -a 192.168.1.100 -n nodered -d
Security Camera Access
Access your camera system remotely:
bash
drip http 8080 -a 192.168.1.200 -n cameras --allow-ip YOUR_IP -dPlex Media Server
Share your Plex server:
bash
drip http 32400 -a 192.168.1.50 -n plex -dJellyfin / Emby
bash
drip http 8096 -a 192.168.1.50 -n jellyfin -dPi-hole Admin
Access Pi-hole dashboard remotely:
bash
drip http 80 -a 192.168.1.53 -n pihole --allow-ip YOUR_IP -dTips for Home Server
- Use daemon mode (
-d) for persistent tunnels - Restrict access with
--allow-ipfor sensitive services - Use memorable subdomains for easy access
- Set up on boot using systemd or cron:
bash
# Add to crontab
@reboot /usr/local/bin/drip http 5000 -a 192.168.1.50 -n nas -dOr create a systemd user service:
ini
[Unit]
Description=Drip Tunnel for NAS
After=network.target
[Service]
ExecStart=/usr/local/bin/drip http 5000 -a 192.168.1.50 -n nas
Restart=always
[Install]
WantedBy=default.target