The game-changing difference for me is that I use Tailsscale to map network drives away from home using their Tailscale-assigned machine name - which is amazingly useful because it means the mapping stays the same regardless of whether I'm actually at home with my router's assigned IP address, or away, with my VPN's assigned IP address. I had problems with mapped drives using OpenVPN, but with Tailscale set to 'Run unattended' I no longer have to think about it.
I use to use Open VPN but switched to Wireguard which is another alternative to Open VPN. I use Tailscale mostly with family and friends. It does work with Wireguard under the hood. But for me remoting back into my network I use self hosted Wireguard VPN.
Really like the video! One critique: the video title has a misspelling and seems somewhat inaccurate. Instead of "Tailscale vs OpenVPN: What is the BEST was to secure your NAS?" I suggest the following: "Tailscale vs OpenVPN: What is the BEST way to remotely connect to your NAS?" A title like that seems better in my opinion👍
So how would I use Synology DS Cam with Tailscale? Do I first install Tailscale on the Synology NAS and then install the Tailscale app on my Android phone and somehow connect them?
So, with Tailscale VPN my file transfer from home NAS to work NAS are going through the Tailscale server? I don't want anything between my NAS to NAS connection.
They go through Tailscale relay severs (if not direct connection) in the same way that your network traffic routes through the 30+ routers on the internet between your ISP’s routers
I like Open VPN... however the latest version of OPENVPNConnect has issues with OpenVPN on Synology. I have to use an Older version of the client to be able to VPN into my synology
Thanks for the video. To work remote on the nas you always need download the files first. Specially with MS office documents this is a big hassle. How do you solve this?
While I agree it's not necessarily ideal just on principle, opening a single UDP port for Wireguard with a pre-shared key etc. is still a very low risk, considering the nature of UDP itself and WireGuard
If I successfully connect to Tailscale without any alteration. Does this mean I made a direct connect? Or can the relay unknowingly get connected? Is there a query to prove which one is being used?
I had tailscale installed but took fear of it when I added a friend to my tailscale and they said they could see my local files . Did I do something wrong
cost wise: you add container with headscale or even a package and you have unlimited tailscale for free. tailscale client is free and Tailscale company only charges for server services. So headscale is your answer. I implemented few such scenarios - all work like a charm The same is with security: headscale solves this problem completely. I am surprised you did not mention it at all.
I use both.
Tailscale for my offsite backup & it's really to setup!
OpenVPN to access to other servers in home network or offsite network.
Nice video!
After spending a month to setup openvpn on synology Finally I use tailscale and I am happy.
The game-changing difference for me is that I use Tailsscale to map network drives away from home using their Tailscale-assigned machine name - which is amazingly useful because it means the mapping stays the same regardless of whether I'm actually at home with my router's assigned IP address, or away, with my VPN's assigned IP address.
I had problems with mapped drives using OpenVPN, but with Tailscale set to 'Run unattended' I no longer have to think about it.
9:57 How do you attain a direct connection with Tailscale??
WOW! I was literally thinking about this!!!! Thanks Space!
I use to use Open VPN but switched to Wireguard which is another alternative to Open VPN. I use Tailscale mostly with family and friends. It does work with Wireguard under the hood. But for me remoting back into my network I use self hosted Wireguard VPN.
Really like the video! One critique: the video title has a misspelling and seems somewhat inaccurate. Instead of "Tailscale vs OpenVPN: What is the BEST was to secure your NAS?" I suggest the following: "Tailscale vs OpenVPN: What is the BEST way to remotely connect to your NAS?" A title like that seems better in my opinion👍
Do you have a link to the offsite backup write-up you mentioned at 24:00?
Tailscale ftw. The ACL feature of tailscale is really the game changer for me. So powerful and easy to use once you get the hang of it.
For me, Tailscale is perfect for accessing home lab & Synology NAS from anywhere. Or I can just use UniFi Teleport. 😊
Another fantastic video! Thank you for all of your hard work. Really informative.
Thank you for the evaluation!
So how would I use Synology DS Cam with Tailscale? Do I first install Tailscale on the Synology NAS and then install the Tailscale app on my Android phone and somehow connect them?
What about ZeroTier? It works flawless on my Synology NAS
Would Cloudflare Tunnel work? I'd love to hear your opinion on it and if you think it's applicable here. thanks!
BTW from looking at the screenshot of your Tailscale Admin console it shows that tailscale client update available on all your clients.
Great video!
So, with Tailscale VPN my file transfer from home NAS to work NAS are going through the Tailscale server? I don't want anything between my NAS to NAS connection.
They go through Tailscale relay severs (if not direct connection) in the same way that your network traffic routes through the 30+ routers on the internet between your ISP’s routers
@@SpaceRexWill Thank you for your reply Will, I really appreciate it. I forgot the move from A to B ALWAYS goes through ISP :)
thanks, brillant video !
My synologys would not connect to each other using their tailnet ip. Don’t know why
I like Open VPN... however the latest version of OPENVPNConnect has issues with OpenVPN on Synology.
I have to use an Older version of the client to be able to VPN into my synology
Terrific video as always!
Thanks for the video. To work remote on the nas you always need download the files first. Specially with MS office documents this is a big hassle. How do you solve this?
And how do they compare to Wireguard?
I believe Tailscale uses wireguard.
While I agree it's not necessarily ideal just on principle, opening a single UDP port for Wireguard with a pre-shared key etc. is still a very low risk, considering the nature of UDP itself and WireGuard
If I successfully connect to Tailscale without any alteration. Does this mean I made a direct connect? Or can the relay unknowingly get connected? Is there a query to prove which one is being used?
I had tailscale installed but took fear of it when I added a friend to my tailscale and they said they could see my local files . Did I do something wrong
That can happen if you did not ser ir up correctly. Check users permission and put your files in home folder, not homes
why would you use either on the NAS level compared to the firewall level of things?
For offices, having user authentication through the NAS is very nice
My question is, if I have a router that offers VPN such as ubiquiti, is there any upside to having a NAS host it instead of the router?
I use it for user authentication for offices all the time. Way easier
Plus easier to manage SSL certificates
What's the keyboard you use?
cost wise: you add container with headscale or even a package and you have unlimited tailscale for free. tailscale client is free and Tailscale company only charges for server services. So headscale is your answer. I implemented few such scenarios - all work like a charm
The same is with security: headscale solves this problem completely.
I am surprised you did not mention it at all.
Thanks.
Privacy, openvpn won... but what if I run my own tail scale server?
Great review bro! 👊
I hear NetBird is similar and can be self-hosted
Don’t know if you noticed the typo in the title
Rex, I installed Tailscale on my NAS and I got stuck LOL. I can't access my NAS, please help?
I still prefer using my own self hosted Wireguard VPN server when accessing my network remotely. No 3rd party company for me! 🤮
I prefer Perimeter81.
CIA And NSA own tailscale