Disclaimer and Important Warning
Enabling remote access to your Home Assistant instance (via port forwarding, tunnels, DuckDNS, or any other method) exposes your system to the internet and increases the risk of unauthorised access, security breaches, or compromise of connected devices—including your Fluss+ controls.
We are not responsible for any security issues, data loss, unauthorised control of your devices, property damage, personal injury, or other consequences that may result from improper configuration, vulnerabilities, weak credentials, or external attacks.
Remote access should only be set up if you fully understand the risks and have implemented strong security measures (such as HTTPS, MFA, IP banning, regular updates, and preferably a VPN or Nabu Casa instead of direct exposure).
Proceed entirely at your own risk. If in doubt, keep Home Assistant local-only and avoid exposing it remotely.