Introduction to Ngrok
This works because Ngrok is calling outbound, and meeting its other side on the internet.
ngrok is an application that gives you external (internet) access to your private systems that are hidden behind NAT or a firewall. It’s basically a super slick, encrypted TCP tunnel that provides an internet-accessible address that anyone can get to, and then links the other side of that tunnel to functionality running local.
Here’s what it does:
Two of the examples they give on the site include: 1) public URLs for sending previews to clients, and 2) demoing local functionality with external people.
Ngrok simplifies what used to require lots of trickery, usually involving SSH.
The other cool thing about Ngrok is that it allows you to see the HTTP traffic that’s being tunneled over it via a separate interface, which is by default hosted on http://127.0.0.1:4040. This especially helps the normies that are using it legitimately for testing and troubleshooting (?).
I have tested this on my Mac, PC, and a RaspberryPie Zero W and it works great! The only downside is the free version changes the public URL to a random node each time its restarted.
This works because Ngrok is calling outbound, and meeting its other side on the internet.
ngrok is an application that gives you external (internet) access to your private systems that are hidden behind NAT or a firewall. It’s basically a super slick, encrypted TCP tunnel that provides an internet-accessible address that anyone can get to, and then links the other side of that tunnel to functionality running local.
Here’s what it does:
- You run ngrok from a local system with a service you want to make available to people on the internet
- Just run the command and give it the protocol you want to use, along with the local port it’s listening on
- Ngrok then creates an address in the cloud that people can get to
- It then connects those two things over an encrypted tunnel, so when you hit the Internet address, you land on your local service automagically!
Two of the examples they give on the site include: 1) public URLs for sending previews to clients, and 2) demoing local functionality with external people.
Ngrok simplifies what used to require lots of trickery, usually involving SSH.
The other cool thing about Ngrok is that it allows you to see the HTTP traffic that’s being tunneled over it via a separate interface, which is by default hosted on http://127.0.0.1:4040. This especially helps the normies that are using it legitimately for testing and troubleshooting (?).
I have tested this on my Mac, PC, and a RaspberryPie Zero W and it works great! The only downside is the free version changes the public URL to a random node each time its restarted.