How to Setup The Tailscale VPN and Routing on pfsense

แชร์
ฝัง
  • เผยแพร่เมื่อ 22 ก.ค. 2024
  • How To Setup pfsense OpenVPN Policy Routing With Kill Switch Using A Privacy VPN
    • How To Setup pfsense O...
    How Tailscale Makes Managing Wireguard Easy
    • How Tailscale Makes Ma...
    Tailscale VS ZeroTier
    • Tailscale VS Zerotier
    Netgate tailscale Blog post
    www.netgate.com/blog/tailscal...
    tailsacle NAT write up
    tailscale.com/blog/how-nat-tr...
    Headscale GitHub
    github.com/juanfont/headscale...
    tailsacle userspace kernel
    tailscale.com/kb/1177/kernel-...
    Connecting With Us
    ---------------------------------------------------
    + Hire Us For A Project: lawrencesystems.com/hire-us/
    + Tom Twitter 🐦 / tomlawrencetech
    + Our Web Site www.lawrencesystems.com/
    + Our Forums forums.lawrencesystems.com/
    + Instagram / lawrencesystems
    + Facebook / lawrencesystems
    + GitHub github.com/lawrencesystems/
    + Discord / discord
    Lawrence Systems Shirts and Swag
    ---------------------------------------------------
    ►👕 lawrence.video/swag
    AFFILIATES & REFERRAL LINKS
    ---------------------------------------------------
    Amazon Affiliate Store
    🛒 www.amazon.com/shop/lawrences...
    UniFi Affiliate Link
    🛒 store.ui.com?a_aid=LTS
    All Of Our Affiliates that help us out and can get you discounts!
    🛒 lawrencesystems.com/partners-...
    Gear we use on Kit
    🛒 kit.co/lawrencesystems
    Use OfferCode LTSERVICES to get 10% off your order at
    🛒 lawrence.video/techsupplydirect
    Digital Ocean Offer Code
    🛒 m.do.co/c/85de8d181725
    HostiFi UniFi Cloud Hosting Service
    🛒 hostifi.net/?via=lawrencesystems
    Netgate tailscale Blog post
    www.netgate.com/blog/tailscal...
    tailsacle NAT write up
    tailscale.com/blog/how-nat-tr...
    Headscale GitHub
    github.com/juanfont/headscale...
    tailsacle userspace kernel
    tailscale.com/kb/1177/kernel-...
    Protect you privacy with a VPN from Private Internet Access
    🛒 www.privateinternetaccess.com...
    Patreon
    💰 / lawrencesystems
    ⏱ Timestamps ⏱
    00:00 pfsense tailscale package
    03:31 Headscale server
    04:19 Tailscale Web Management
    05:26 Tailscale Access Control Security
    06:10 Managing Tailscale in pfsense
    09:36 pfsense routes and exit node
    10:48 Tailscale Connectivity and Firewall Security
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 107

  • @LAWRENCESYSTEMS
    @LAWRENCESYSTEMS  2 ปีที่แล้ว +6

    How To Setup pfsense OpenVPN Policy Routing With Kill Switch Using A Privacy VPN
    th-cam.com/video/ulRgecz0UsQ/w-d-xo.html
    How Tailscale Makes Managing Wireguard Easy
    th-cam.com/video/bcRVkoeSN0E/w-d-xo.html
    Tailscale VS ZeroTier
    th-cam.com/video/lAhD2JDVG08/w-d-xo.html
    Netgate tailscale Blog post
    www.netgate.com/blog/tailscale-on-pfsense-software
    tailsacle NAT write up
    tailscale.com/blog/how-nat-traversal-works/
    Headscale GitHub
    github.com/juanfont/headscale/tree/main/docs
    tailsacle userspace kernel
    tailscale.com/kb/1177/kernel-vs-userspace-routers/
    ⏱ Timestamps ⏱
    00:00 pfsense tailscale package
    03:31 Headscale server
    04:19 Tailscale Web Management
    05:26 Tailscale Access Control Security
    06:10 Managing Tailscale in pfsense
    09:36 pfsense routes and exit node
    10:48 Tailscale Connectivity and Firewall Security

  • @John-vk1ij
    @John-vk1ij ปีที่แล้ว +11

    Another suggestion, when operating on two different pfSense instances, it's easier for the audience to tell which pfSense is currently being configured if they uses different color scheme.

  • @krenkotv3240
    @krenkotv3240 2 ปีที่แล้ว +38

    Headscale videos are non existent! Maybe you could do a quick "How TO - Setup" guide for the people :)

    • @MrChris79
      @MrChris79 2 ปีที่แล้ว +2

      Agreed! I was able to setup and get basic headscale working with my pfbox but stuggle to get acls so I can see my pf lan devices from remote tailscale clients! I have learned lots from Toms videos.

    • @prashanthb6521
      @prashanthb6521 ปีที่แล้ว

      I hope so.

  • @ColeBlack2
    @ColeBlack2 2 ปีที่แล้ว +1

    Been using Tailscale for a while now and been having to use raspberry pi pas at a couple sites at Tailscale subnet routing bridges. This is awesome. Very welcomed plug-in.

  • @ws2940
    @ws2940 2 ปีที่แล้ว +1

    Thank you for the video. Will definitely take a look at the NAT article.

  • @speedup070605
    @speedup070605 2 ปีที่แล้ว +1

    Thanks for sharing, love your work you give sharing knowledge about pfsense

  • @qcnsllcqcnsupport7616
    @qcnsllcqcnsupport7616 2 ปีที่แล้ว

    Great video Tom, and thankyou for all the great work 👍🏼

  • @havok4103
    @havok4103 ปีที่แล้ว

    tailscale is such an incredible tunnel resource! I have starlink (which has carrier NAT), so making a tunnel home has been troublesome... not with tailscale! it works great! and i can access everything behind pfsense, thank you for this video!!!

  • @mithubopensourcelab482
    @mithubopensourcelab482 2 ปีที่แล้ว

    Excellent tutorial as usual. Many thanks.

  • @clarkmakoni905
    @clarkmakoni905 2 ปีที่แล้ว +4

    Thank you so much Tom for another great tutorial. If you could do a video on Headscale it would be most appreciated.

  • @tornadotj2059
    @tornadotj2059 2 ปีที่แล้ว +1

    Thanks Tom, this is perfect timing for me. I recently started moving off of my local WISP to T-Mobile and AT&T, and was working through some solutions to get around CGNAT. Although I've been successful so far, I'm not an "all my eggs in one basket" person, so I like options. I'm going through now and setting up a Tailscale configuration. I'd also like to see a Headscale video.

    • @tornadotj2059
      @tornadotj2059 2 ปีที่แล้ว +2

      And, I'm already finished. Fully tested from phone on CGNAT into my network on CGNAT, and everything is perfect. This is simply awesome.

  • @ALAINCABANDO
    @ALAINCABANDO 2 ปีที่แล้ว +1

    followed your guide.. its realy simple and easy..

  • @irtibatkisileri222
    @irtibatkisileri222 ปีที่แล้ว

    Coming behind the actual tech improvement. May be it is already done. here my upvote for headscale tutorial. Thanks for this one

  • @xellaz
    @xellaz ปีที่แล้ว

    My network is something similar but using two firewalla devices in router mode in different locations for site-to-site VPN access between both using Wireguard protocol. I mapped my NAS located on another site using its local IP through the VPN on a PC. It works pretty well.

  • @laov6843
    @laov6843 หลายเดือนก่อน

    Thanks. Great section for the firewall rule. I was wondering why I have no access to my PFsense web UI from tailscale. The rule solved my issue as I needed a quick way to get to the managment UI from anywhere.

  • @amosgiture
    @amosgiture 2 ปีที่แล้ว +1

    Tailscale exit node and route advertising make is so much more appealing than nebula & zerotier. Will definitely try out headscale to scale beyond the tailscale 20 free limit. Tailscale on pfsense just blows my mind!!!

  • @ierosgr
    @ierosgr 2 ปีที่แล้ว

    12.59 I noticed the option interface has the value Tailscale for the dropdown menu. Does this mean you need to assign Tailscale to a Pfsense interface? Thought that it was mandatory only for geolocation VPN solution

  • @reijin999
    @reijin999 ปีที่แล้ว +1

    I would like a headscale video (and a pfsense package lol). I basically already have this setup with pure wireguard as a site to point to pfsense installed on a VPS, I then connect other VPS servers to that pfsense install and can access them as if they are a part of my lan but I would really like a UI for scalability. Will have to try tailscale for now.

  • @dannymaasland3966
    @dannymaasland3966 ปีที่แล้ว

    I have existing ipsec tunnels from different locations connected to 1 pfsense box as a site 2 site connection, how would I go about advertising those subnets with tail scale aswell? I have simply added them to advertised routes but that doesn't seem to be enough.

  • @bsem68
    @bsem68 ปีที่แล้ว

    This example only allows one direction from all the other sites to tom-home-pfsense. In order for a 2-way site to site vpn using tailscale, it seems that you need to enable subnet routes for the machine in tailscale, and advertise subnet routes on the pfsense eg. lts-tailscale and put the correct outbound NAT on each other pfsense you want to access from. The free version of tailscale only allows 1 free subnet router... they have a soft limit so you could probably add another one like I did to test for a while.

  • @taranagnew436
    @taranagnew436 ปีที่แล้ว

    can you include/exclude apps to use tailscale and how do you have 1 main tunnel and conect other devices to the tunnel?

  • @DanielWillen
    @DanielWillen ปีที่แล้ว

    I have an IPsec established from the pfsense, to a remote subnet. From the LAN it works fine, but when I try to advertise the subnet , clients cannot find it. I tried advertising the LAN like you did, and it worked just fine. Thinking there needs to be some NAT rule or something

  • @KhatabAhmed
    @KhatabAhmed ปีที่แล้ว

    Many Thanks....

  • @kimlindberg5815
    @kimlindberg5815 ปีที่แล้ว

    Is is possible to show a senario where you have 2 pfsense firewalls where tailscale connects to sites and each site has a few vlans on their lan side and only some vlans is allowed to talk to some vlans at the other site ?

  • @sobesjm
    @sobesjm ปีที่แล้ว

    Thanks for the video. Clear and concise. I notice on your Tailscale Machines page you have the local subnets listed in the addresses column along with the Tailscale address. While my setup is working just find between 2 subnets, my Machines page is only showing me the Tailscale addresses and not the local subnet addresses. Did I miss how this is enabled? Thanks

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว

      You can have Tailscale push other routes if needed.

  • @scottc2211
    @scottc2211 2 ปีที่แล้ว +2

    Greatly appreciate the videos you create. Curious though how much of a performance difference is there between Tailscale and Wireguard? Would love to see the comparison. If it’s drastically different I would consider switching over.

    • @neosmith80
      @neosmith80 ปีที่แล้ว

      The open-source software acts in combination with the management service to establish peer-to-peer or relayed VPN communication with other clients using the Wireguard protocol.
      I would imagine that since tailscale is using the wireguard protocol that there wouldn't be much of a difference between them. Tailscale could be a bit easier to get up and going though, vs wireguard having to get the config to each client.

    • @JanDemore
      @JanDemore ปีที่แล้ว

      @@neosmith80 @scottc2211 For me Wireguard is 2x faster than Tailscale,both running in Pfsense

  • @gjkrisa
    @gjkrisa 2 ปีที่แล้ว

    Some how I kept missing the part where Tailscale (genx)was talking about adding a firewall rule for Tailscale and was not working not passing traffic or pingable although would try connection till timeout.
    I’ll have to do that when I get home.

    • @gjkrisa
      @gjkrisa 2 ปีที่แล้ว

      Yeah added a pass all on tailscale tab and it all works great

  • @mikescott4008
    @mikescott4008 3 หลายเดือนก่อน

    Playing round with it, but can't see a use case for me above having Wireguard / OpenVPN on the pfsense. Lack of opening ports is good. Will delve deeper. I'm not behind CGNAT and such.

  • @remkm1715
    @remkm1715 ปีที่แล้ว +2

    id love to see someone going trough the process of setting up ACL on a virgin tailscale network.. for the less network minded folks so to say :)

  • @DanielWillen
    @DanielWillen ปีที่แล้ว

    A bit of a stupid question perhaps, but can you run an exit node that that exposes routes on anything other than the pfsense (for example, a machine running Linux in the LAN). Or an Azure VM in the same subnet as other VMs.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว

      Tailscale allows you to choose what endpoints can be exit nodes

  • @georgiostsitouridis
    @georgiostsitouridis ปีที่แล้ว

    Great video! Nice way you put everything in order and made them clear. I would like to see though a video regarding different setups and how to manage pfsense with the tailscale package. For example, is it possible to access a device in tailscale network from behind the pfsense, without having the tailscale client installed?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว

      Yes, that is a use case I talked about in the video.

    • @georgiostsitouridis
      @georgiostsitouridis ปีที่แล้ว

      @@LAWRENCESYSTEMS Indeed you talk about it, but with one difference (I think, if I understood corretly)..... that is you do have the tailscale client installed on the local client and then you add the Tailscale rule, which enables pinging directly to 100.x.x.x. What about a case where there is no tailscale SW installed on local client and use pfsense as a gateway to managmenet plane as well.

  • @rudypieplenbosch6752
    @rudypieplenbosch6752 2 ปีที่แล้ว +1

    I can use this as ab alternative to zerotier, which works great but I need a VM to keep it up.

  • @Th3H4cK3r
    @Th3H4cK3r 2 ปีที่แล้ว

    A headscale video would be greate

  • @GrishTech
    @GrishTech 2 ปีที่แล้ว +15

    Time for ZeroTier. It needs to be added to pfsense.

    • @parl-88
      @parl-88 2 ปีที่แล้ว

      I second that motion!! Nice 👍

    • @kc0eks
      @kc0eks 2 ปีที่แล้ว

      Love zerotier really wish it was an option built into pf

    • @occamsrazor000
      @occamsrazor000 2 ปีที่แล้ว

      There was a request thread on the Netgate forum for like 4 years… that never went anywhere. A shame, I like ZT…

    • @GrishTech
      @GrishTech 2 ปีที่แล้ว

      @@occamsrazor000 yea I read it. Maybe it doesn’t adhere to some standard? Do packages have to support pfsense HA to be properly supported/implemented by netgate?

  • @z1haze
    @z1haze 2 หลายเดือนก่อน

    If I have tailscale installed on my pfsense router like you do in your video, how can I configure things so that mobile devices connected to tailscale can take advantage of the pihole dns that I use on my network? My pihole service runs on the same network as the pfsense router.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 หลายเดือนก่อน

      It might work if you specify your pi-hole DNS in your Tailscale DNS settings

  • @MrChris79
    @MrChris79 2 ปีที่แล้ว

    Thanks Tom for the video. Can you please do a basic tutorial on setting up pfsense with headscale including basic acl that allow accessing pfsense vlans or lan devices?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว

      Tailscale pushes networks not VLAN's

  • @charlescc1000
    @charlescc1000 2 ปีที่แล้ว +6

    Pretty cool to see there is now a tailscale pfsense package. I could see this being pretty useful if I were behind a CGNAT ISP, but the tailscale managed connection interface definitely worries me. I essentially view this as opening my local private LAN to an external company. Not worth the risk in my view.
    Thus headscale is a pretty appealing offering.
    I’m not behind a CGNAT so I don’t really have much of a usecase for either. I use wireguard to access my LAN remotely and use OpenVPN for a site to site VPN.
    The only VPN troubles I have is that when traveling I sometimes find hotels block my wireguard remote access VPN. I don’t think tailscale would behave any differently but I haven’t tried it myself. I believe it would use similar ports to any wireguard VPN. Maybe either can be setup to run on 443? Not sure

    • @Darkk6969
      @Darkk6969 2 ปีที่แล้ว +2

      There is a discussion on Reddit about free wifi blocking access to wireguard. Fortinet firewall is known to do this. No issues with OpenVPN long as the default port of 1190 is not blocked. I have two OpenVPN server sessions with custom ports for this reason.
      I share the same security concerns about using TailScale for my network. Headscale is a good open source option but takes bit more work to get it going on the server side and managing it. I am happy to see pfsense now supports it via the package.

    • @fuseteam
      @fuseteam 11 หลายเดือนก่อน

      Doesn't headscale offer the same challenge as openvpn? To use your own headscale server you need a public ip

    • @break1146
      @break1146 8 หลายเดือนก่อน

      @@fuseteam You could rent a VPS to run Headscale. The advantage being it can broker a peer to peer connection between client. Using traditional VPN, you would need to route traffic actually through that VPS, which obviously hurts performance, latency and you might have to deal with data caps depending on where the VPS is rented from.

  • @bmp6361
    @bmp6361 9 หลายเดือนก่อน

    Great tutorial, wondering why you differed from Christian McDonald's outbound NAT. You set the destination and he set the source. I guess it makes no difference. Thanks Tom, again great tutorial.

  • @universo5network540
    @universo5network540 ปีที่แล้ว

    Thanks for the video; one question: how did you set up a subnet router in PfSense?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว

      th-cam.com/video/fsdm5uc_LsU/w-d-xo.html

  • @mithubopensourcelab482
    @mithubopensourcelab482 2 ปีที่แล้ว

    Tailscale is based on Wireguard. What secret sauce Tailscale added publish routes so that non-tailscale (client install ) can be easily reached via overlay network ? Can some one explain this.

  • @ryanroberts210
    @ryanroberts210 2 ปีที่แล้ว

    I've got two networks on two different pfSense boxes talking to each other, accessible, etc... Great, thanks! What I'd like to do though is have one pfSense be the Exit Node for the other, i.e. all the traffic in and out of one pfSense is going through the other. I see how to use Exit Node with a phone or laptop, but not how to tell the pfSense subnet router to use the other one... Any ideas? Thx

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว +1

      I am not aware of a way to currently do that buy they may add the option in the future.

    • @ryanroberts210
      @ryanroberts210 2 ปีที่แล้ว

      @@LAWRENCESYSTEMS Appreciate the quick response. I left the comment on Christian MacDonalds video as well... :)

  • @ClanLawrence
    @ClanLawrence 11 หลายเดือนก่อน

    Awesome video, thanks for creating it. Is there an easy way to get Tailscale traffic bound for the WAN to use a non-default Gateway?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  11 หลายเดือนก่อน

      Not something I've had a need for or tested

    • @ClanLawrence
      @ClanLawrence 11 หลายเดือนก่อน

      ​@@LAWRENCESYSTEMS The use case is that I'd like to have access to my home LAN, but also route internet traffic via my NORD VPN Gateway. I have an Alias list in PfSense for clients that I want to route via NORD and that works nicely. When I used Wireguard it was just a case of creating a Firewall rule on the Wireguard Interface with Nord set as the gateway. This doesn't appear to work the same way with Tailscale however.
      Love your videos btw, keep up the good work :)

  • @TradersTradingEdge
    @TradersTradingEdge ปีที่แล้ว

    Hi Tom. Great explanation, thanks.
    Is it possible to route TS to HA-Proxy to access my services behind HA-Proxy? Any hint for me? TNX

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว

      They should work together.

    • @TradersTradingEdge
      @TradersTradingEdge ปีที่แล้ว

      @@LAWRENCESYSTEMS TNX Tom.
      I totally struggle here and can't get it to work.
      Do you know any website/ressource explaining how to setup TS & HA-P. in pfsense?
      tnx Mate.

  • @crites57
    @crites57 ปีที่แล้ว

    Tailscale won't let me generate a key, I think because my role is an Owner. Can anyone tell me how to change my role to Admin or Network Admin?

  • @lolololowbx280
    @lolololowbx280 2 ปีที่แล้ว

    Would to see selfhosted zerotier network via zero-ui

  • @kc0eks
    @kc0eks 2 ปีที่แล้ว +1

    What happens if I link multiple networks that use the same subnets? Guess I will find out when I add another...

  • @sebastianpulver3604
    @sebastianpulver3604 2 ปีที่แล้ว

    is it possible to use ospf over tailscale to advertise the routes instead of tailscale itself?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว

      Don't think Tailscale has OSPF support

  • @patrickFREE.
    @patrickFREE. 6 หลายเดือนก่อน

    Does it even works on opnsense?

  • @Rookie23095
    @Rookie23095 ปีที่แล้ว

    Tailscale could be just what we need, can you limit access to just a couple of ports on a windows device in your network eg. camera DVR? I have other apps on this server that I don't not want to open up particularly with limited or no access logging available. As the DVR needs a username and password, I am ok with that level of risk. If this is doable, how could you do it securely?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว +1

      Yes, you can create limiting rules in Tailscale.

  • @NyarUhc
    @NyarUhc 2 หลายเดือนก่อน

    Hi brother .. Is there a NAT punch hole in a Tailscale? I want to redirect ports from our Huawei router to my computer to be able to utilize it. The Port Forwarding in our router is not working cuz something is blocking it. Please acknowledge my comment.Thank you very much

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 หลายเดือนก่อน

      Yes, you can use Tailscale behind NAT.

    • @NyarUhc
      @NyarUhc 2 หลายเดือนก่อน

      @@LAWRENCESYSTEMS how to do it? Sorry, I really have no idea since I'm not that techie..

  • @yuriw777
    @yuriw777 6 หลายเดือนก่อน

    Assuming I don't plan to access my firewall pfsense directly from the open internet and want only to access some boxes where I have TS clients installed, why do I even need TS on my router?
    Happy New Year all!

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  6 หลายเดือนก่อน

      Having it on the router allows easy access to all devices across all networks, even the devices that do not have Tailscale.

  • @Saturn2888
    @Saturn2888 ปีที่แล้ว

    Man, none of that automated Tailscale routing happened for me. All my stuff looks like yours, but I don't have any firewall NAT or outbound rules. I can't even ping the box from the Tailscale network even though everything looks good. Something's gotta be messed up here.

    • @Saturn2888
      @Saturn2888 ปีที่แล้ว

      Third time's the charm! Now it's showing up some stuff. Still can't ping the box, but now I finally have routes! Still no Outbound mappings though.

  • @user-eu6gx3lu2b
    @user-eu6gx3lu2b ปีที่แล้ว

    I really wish this tutorial show each step including the firewall rules. I cannot get my subnet routes to work

  • @JPEaglesandKatz
    @JPEaglesandKatz 2 ปีที่แล้ว

    great video again.. One thing I'm worried about is the fact that there is no login on the android tailscale app... it authenticates without any login/credentials, totp... if someone gets their hands on your phone and unlock it they are free to do whatever they want... Unless ofc I'm missing something, which is very possible :)

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว

      It relies on the security of your phone so use a good phone lock password.

    • @JPEaglesandKatz
      @JPEaglesandKatz 2 ปีที่แล้ว

      @@LAWRENCESYSTEMS Yup!!! Still would love to see something like otp or yubikey support added for logging in to the app!

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว +1

      @@JPEaglesandKatz Tailscale does not handle logins, that is why they use third parties.

  • @AgentLokVokun
    @AgentLokVokun 2 ปีที่แล้ว

    I never knew this existed. NOICE.

  • @falazarte
    @falazarte 2 ปีที่แล้ว

    This might be an answer to my prayers.. LOL. Do you think it's possible to have, for example, Unifi software to control Hotspots in different offices with different IPs, but have the same WiFi mesh?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว

      I don't understand the goal.

    • @falazarte
      @falazarte 2 ปีที่แล้ว

      THe goal is to have one mesh across multiple offices in different towns. Offices have different DHCP's connected via iPsec at the present time.

    • @DrDingus
      @DrDingus 11 หลายเดือนก่อน

      but why@@falazarte

    • @falazarte
      @falazarte 11 หลายเดือนก่อน

      @DrDingus when you connect to the AA (Aerolineas Argentina) WiFi , no matter which city Airport in Argentina, you are part of the same WiFi and you do not have to enter credentials in each city. I'd lime to build something like that for this company different offices in different cities so roaming employees don't have ro be entering credencial at each office.

    • @DrDingus
      @DrDingus 11 หลายเดือนก่อน

      @@falazarte radius

  • @VillSid
    @VillSid 2 ปีที่แล้ว

    I have set tailscale up on OpenWRT but be very mindful that it will om nom nom your CPU if your's is not ARM 64 or x86 even if it has crypto accelerators.

  • @chromerims
    @chromerims ปีที่แล้ว

    Tailscale is backed by CRV, Insight Partners, Accel, Heavybit, Uncork Capital, and individual investors. Its May 2022 Series B added $100 million in funding.

  • @ssspop85
    @ssspop85 ปีที่แล้ว

    Tailscale and Ubiquti USG firewall rules , can you hellp me ?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว

      Tailscale does not work on a Ubiquti USG

  • @ikkuranus
    @ikkuranus 2 ปีที่แล้ว +1

    Don't bother trying to install this with 2.5.x It shows up but will just error trying to install a dependency.

    • @denix0
      @denix0 ปีที่แล้ว

      Why wouldn't this be prevented in the Package Manager?? Bad packager, bad packager!

  • @zyghom
    @zyghom 4 หลายเดือนก่อน +1

    the settings are not easy and the video is so convoluted... ehhhh

  • @TechySpeaking
    @TechySpeaking 2 ปีที่แล้ว +1

    First