Difference between revisions of "TailScale"
Jump to navigation
Jump to search
Line 34: | Line 34: | ||
== As a VPN type tunnel == | == As a VPN type tunnel == | ||
For some reason, nobody talks about how to use TailScale to actually access your pfSense-managed network from the OUTSIDE. | For some reason, nobody talks about how to use TailScale to actually access your pfSense-managed network from the OUTSIDE. | ||
What I've figured out so far... | |||
Assign the TailScale interface: | |||
'''Interfaces / Assignments''' & click "Add" beside "tailscale0 (tailscale0)". | |||
Then, in your NAT settings, '''Firewall / NAT / Port Forward''', When you create a NAT forward that uses TailScale, select the '''Tailscale''' interface & '''Any''' as the destination. This will allow you to treat the TailScale IP address just like you would normally treat the WAN address. | |||
= HeadScale = | = HeadScale = |
Revision as of 01:21, 9 March 2023
11 (bullseye) |
|
WIP!!! As always...
Start with:
sudo apt update
sudo apt upgrade
TailScale HowTo
- Tailscale quickstart (Get individual machines onto your private TailScale network)
TailScale & pfSense
- A Tailscale Package for pfSense! (video)
- exit node
- subnet router
- 6:20 - configuration
- 7:30 - mention of headscale
- 16:15 - Subnets
- 19:30 - Firewall rules
- 20:32 - routing limitations
- 27:30 - Outbound NAT
- Tailscale on pfSense Software! (blog)
- How to Set Up Tailscale on pfSense
As a VPN type tunnel
For some reason, nobody talks about how to use TailScale to actually access your pfSense-managed network from the OUTSIDE.
What I've figured out so far...
Assign the TailScale interface:
Interfaces / Assignments & click "Add" beside "tailscale0 (tailscale0)".
Then, in your NAT settings, Firewall / NAT / Port Forward, When you create a NAT forward that uses TailScale, select the Tailscale interface & Any as the destination. This will allow you to treat the TailScale IP address just like you would normally treat the WAN address.