Access Home Network Remotely Without VPN: A Comprehensive Guide Using V2Ray, Clash, and More

Learn how to securely access your home network remotely without a VPN, using common proxy tools like V2Ray and Clash, for seamless internal service access.

Access Home Network Remotely Without VPN: A Comprehensive Guide Using V2Ray, Clash, and More

This guide details how to access internal network services remotely without a VPN, utilizing common proxy tools such as V2Ray, Clash, and others. It addresses the common issue where these tools bypass internal network traffic, providing step-by-step instructions for configuration across various operating systems and proxy clients.

Setting Up a Home Node on Your Router

The first step involves setting up a node on the home network, typically on a router or an internal computer, accessible via the public internet. The following outlines configurations for popular router plugins:

Homeproxy

  • Navigate to server settings and add a new node.
  • Select the desired node type (e.g., SOCKS or Shadowsocks).
  • Configure the port (e.g., 7788), password, and encryption method.
  • Enable the node and configure the firewall.
Router interface showing Homeproxy plugin settings

Passwall

  • Add a new service in the server settings.
  • Enable the service and configure the IP, port, password, and encryption method.
  • Enable “Accept LAN Access.”
  • Enable the service in the overview section.

OpenClash

  • Navigate to plugin settings and disable “Only Allow Internal Network.”
  • Modify the SOCKS5 port (e.g., to 7788).
  • Enable authentication and set a username/password.

Configuring Router Firewall for Public Access

To allow public access to the node, configure the router’s firewall. The configuration differs based on whether the router has a public IPv4 or IPv6 address.

IPv4 Configuration

  • Set up port forwarding, directing external port 7788 to the router’s internal IP address and port 7788.

IPv6 Configuration

  • Create a traffic rule allowing WAN traffic to the device on port 7788, using IPv6 protocol.
See also  Securing Your Home Network with IPv6: A Comprehensive Guide for Remote Access and Management

After configuration, verify that the port is accessible from the public internet using online tools.

Router firewall settings showing port forwarding rules

Client-Side Configuration: Mac, Windows, and Android

The guide details configuration steps for various clients on different operating systems. The core principle remains consistent: add the home node, configure traffic routing rules, and remove the internal network from direct connection bypass lists.

macOS: Shadowrocket, Clash for Windows, Surge

Configuration involves adding the home node with the appropriate protocol (SOCKS5 or SS), then configuring rules to route internal network traffic through this node. Key steps include removing the home network’s subnet from the “bypass proxy” list and creating a rule to direct traffic to the home node based on IP-CIDR.

Windows: V2RayN, Clash for Windows

V2RayN requires manual switching between the home node and other nodes for internet access. Users need to add the home node and configure routing rules to prioritize internal network traffic through the home node.

Android: V2RayNG, Nekobox, Surfboard

V2RayNG and Nekobox require manual node switching. Surfboard allows for configuration of traffic routing policies, similar to Clash, enabling automatic routing of internal traffic through the home node.

Addressing Dynamic IP Addresses with DDNS

To handle dynamic public IP addresses, configure DDNS (Dynamic Domain Name System). This ensures consistent access to the home network even when the IP address changes.

Important Considerations

Ensure that the local network and the home network operate on different subnets to avoid routing conflicts. For example, if the home network uses 192.168.2.x, the local network should use a different range.

By following these steps, users can establish secure and flexible remote access to their home network services without relying on a traditional VPN.

See also  Sing-box Deep Dive: Configuration, Routing, and Advanced Features for Proxies

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top