Through the P2P TUTK service I mentioned. Penetrating the firewalls on both sides is exactly what it’s for.
Here is a description from Wyze as to how it works.