Тёмный

Tailscale inside LXC | Secure remote access to your server | Proxmox Home Server | Home Lab 

MRP
Подписаться 23 тыс.
Просмотров 46 тыс.
50% 1

Опубликовано:

 

26 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 148   
@thehostler0
@thehostler0 5 месяцев назад
Even though the video is just over a year old by now, the steps are exactly the same. I've followed your guide and ran into zero issues. Thank you :)
@paul9812-t3i
@paul9812-t3i Год назад
Dude, you're an absolute legend. What a well explained, easy to follow tutorial. Brilliant stuff! Thank you
@QEDAGI
@QEDAGI 4 месяца назад
Don't know why I'd put off routing for a Proxmox server on my tailnet. You made it look so simple, I did it right away. Thanks!
@carlrudner
@carlrudner 4 месяца назад
The only way i have managed to get tailscale to work on my home server! Thanks for this walk through.
@KristijanDujakovic
@KristijanDujakovic 3 месяца назад
Fantastic! Tried so many of the Tailscale Guides...this works from scratch, super easy 👍
@hotrodhunk7389
@hotrodhunk7389 11 месяцев назад
I've tried so many other VPNs. Nothing worked with my cg-nat. But tailscale had zero problems finding a path. Works flawlessly for me.
@NickSale-q6y
@NickSale-q6y 4 месяца назад
Successfully installed Tailscale on a LXC thanks to you! Thank you!
@MrSamyWageh
@MrSamyWageh Год назад
This video is a life saver as I was looking for a VPN solution. As usual, detailed instructions and great guide. Thanks MRP.
@BeYourselfMan
@BeYourselfMan 9 месяцев назад
Mr P, you are AMAZING!!!!! Big hug from Portugal. It works flawlessly.
@mijkal
@mijkal Год назад
Excellent guide - thank you! Got everything functioning in a Proxmox LXC by following along.
@gasparem16
@gasparem16 Год назад
Absolutely great video! Clear, easy to follow and down to business :) Thanks a lot!
@rasbe6863
@rasbe6863 10 месяцев назад
Thank you so much for your video. This is one of the most clear and concise videos I found so far to set this up.
@dimitristsoutsouras2712
@dimitristsoutsouras2712 11 месяцев назад
Nice presentation. I think you could also mention and make this guide more inclusive, by showing the way to create split or full tunnels for the clients.
@MartinHyett
@MartinHyett 9 месяцев назад
Thanks @MRPtech for such a useful video. It explained in exactly the right level of detail so I could get my Tailscale instance up and running in Proxmox, after previously struggling a bit with some of the steps needed. My only stumble was getting access to my LAN from my phone. It took me a while to realise that I needed to allow it to use the exit node. Then all worked perfectly!
@MRPtech
@MRPtech 9 месяцев назад
Your welcome. Exit node will route all your traffic from your phone via your home network. Imagen it as VPN (Nord VM, Private Internet Access VPN and others). This is useful when you connected to public WiFi and all traffic goes from your phone back to your home network and then via ISP router to internet. I found this sometimes a bit slow as it need to go from my phone/laptop > home > router > ISP > internet If you want to access home network without Exit node, your tailscale instance at home can be converted into route-advertise node. Which makes that if you time local ip address for example 192.168.123.456 - tailscale will take that and push all traffic to your home network and everything else will go to World Wide Web.
@MartinHyett
@MartinHyett 9 месяцев назад
Good point. I don't want to route internet traffic that way, just access those machines on my local network. So I guess I just need to use the advertise-routes argument and not the advertise-exit-node. I'm slowly beginning to understand it better. I hope!
@hristoistoyanov
@hristoistoyanov 2 месяца назад
Best tutorial ever!
@pr0jectSkyneT
@pr0jectSkyneT 10 месяцев назад
Just found your channel. This video was very helpful to me. Subscribed
@rogerrogerovo2760
@rogerrogerovo2760 4 месяца назад
the follow up video when? :) but a really good proxmox playlist you got here
@noquierounhandle
@noquierounhandle 11 месяцев назад
Thank you so much for this tutorial. Clear as water!
@KorayKüpe
@KorayKüpe 20 дней назад
Great tutorial, thanks a lot. I am unable to use Homekit Bridge with this setup. I enter the homekit pair code and it says unable to add accessories. What may be the problem?
@HenriqueZacchi
@HenriqueZacchi 11 месяцев назад
Excellent video. Short and precise!
@Redd00
@Redd00 Год назад
Really amazing work and for something i havent ever thought of or used before! works great and the video was awesome
@cyrilpinto418
@cyrilpinto418 3 месяца назад
Hi your videos are amazing; could you consider making a video on Wireguard within a Container on a proxmox? Much appreciated.
@hypernarutouzumaki
@hypernarutouzumaki 5 месяцев назад
Hey, I really liked the setup! Could you also please do the promised video on setting up Guacamole that goes hand in hand with this tailscale setup?
@tonyMmonje
@tonyMmonje 8 месяцев назад
exactly what I am looking for. thank you
@joelcriollo3427
@joelcriollo3427 11 месяцев назад
Thanks bro! i really appreciate your video! It-s very helpful! Blessings!
@jorgesoto7783
@jorgesoto7783 5 месяцев назад
Thanks a lot, worked like a treat!
@strix4040
@strix4040 10 месяцев назад
Absolutely great video, thank you
@BobWorrall
@BobWorrall 3 месяца назад
very clean
@rodrigobarbosa6381
@rodrigobarbosa6381 Месяц назад
thank you a lot!!
@ren3059
@ren3059 9 месяцев назад
Your video was incredibly helpful, and I want to express my gratitude. Thank you so much!
@smneamat
@smneamat Год назад
Excellent ! Thank you so much. :)
@oztechsolutions
@oztechsolutions 5 месяцев назад
Great video... thanks! Can you clear out something for me. Why do you need to SSH into that LXC container when you are already login on the terminal via proxmox?
@YourWizBlog
@YourWizBlog 11 месяцев назад
Thank you so much for this excellent video. Worked like charm. For others, what I did not know is that you can access all remote IP's in that network directly from your computer if they are both connected to tailscale. Not sure what happens if both of the networks share the same IP range... but that is not the case for me.
@MRPtech
@MRPtech 11 месяцев назад
What happened with your setup is "subnet advertising" Let's say you have two devices and they are 1000 miles apart. One is in Europe and another one in US. Both are connected to same Tailscale Tailnet. You have turned on in EUROPE server. that means that when you connecting from US to Europe server you can access not only Europe server but all other devices that are in same network as Europe server. I hope that make sense
@MikeDeVincentis
@MikeDeVincentis 3 месяца назад
He's asking what happens when both sides have the same network scheme, like 192.168.1.x on both sides. Can you still access or will you have to change one of the networks?
@gabscar1
@gabscar1 4 месяца назад
Great video. Subscribed!
@daledroid
@daledroid Год назад
good work and explanation mrp, waiting for next video about guacamole
@meh8995
@meh8995 Год назад
did he post it?
@yarekm4270
@yarekm4270 Год назад
@@meh8995 im waiting as well
@gentillidiego
@gentillidiego 2 месяца назад
incredible
@swubutu
@swubutu 8 месяцев назад
thanks for this tutorial ... Its Kungfu Magic !!!
@riskyrun
@riskyrun Год назад
Can I access the proxmox web UI from outside the LAN using tailscale?
@SB-qm5wg
@SB-qm5wg 5 месяцев назад
Good video. TY
@sp4m3r
@sp4m3r 6 месяцев назад
Great video! thank you very much. What would you say regarding security? I mean opening tailscale to access the whole home network?. Thanks!
@heromasum
@heromasum 3 месяца назад
Where's the remotely access proxmox server and container/lxc video?
@krumelmonstertv2266
@krumelmonstertv2266 Год назад
Thank you so much
@MarcelodeSouzaSilva
@MarcelodeSouzaSilva Год назад
Great! Looking forward to the next video showing how to use Guacamole in this container...
@stephenlau3690
@stephenlau3690 5 месяцев назад
Unfortunately, tailscale conflicts to smb in synology nas, the intranet transfer will drop to 0kb once tailscale on in nas.😢 Any way to avoid it?
@rodrigopereira7365
@rodrigopereira7365 5 месяцев назад
TY so much
@petermarin
@petermarin Месяц назад
Do you still needs that change in the proxmox configuration if you’re doing this into a VM?
@ryd3v
@ryd3v 3 месяца назад
just wondering why allow root ssh login, when you can use ssh authorized key instead?
@netelijah
@netelijah Год назад
can you make a video on setting jellyfine, with sonarr and radarr on proxmox using truenas as the storage. please thanks
@TheStealthbob
@TheStealthbob Год назад
Doing the same now...Truecharts while easy at first are a hot mess when they change. Migrating everything off of Truenas
@iamdiego87
@iamdiego87 2 месяца назад
With your very food guide I was able to install tailscale in a Proxmox lxc. But how can I access my proxmox VM remotely? Es. In one VM I've installed home assistant and I would like to access It from my phone where I've installed tailscale.
@MRPtech
@MRPtech 2 месяца назад
You need to switch advertising-routes=A.B.C.0/24 inside that tailscale. And switch that option on in tailscale dashboard. Once you done that you can access all services that are in home network from you phone from anywhere in a world as long as you have tailscale running in your home lab and your phone.
@baileyboy3687
@baileyboy3687 Год назад
Good video and step by step very informative. So, the video just seemed to finish. How do we actually connect to our different home machines from outside world?
@MRPtech
@MRPtech Год назад
Because tailscale lxc has subnet advertising on. using any other device with tailscale install and same account used to login you can access your local network devices from anywhere in the world. I have tailscale app on my phone. and used same account to login. now i can access home NAS from anywhere in the world because tailscale lxc has --advertise-routes ON
@baileyboy3687
@baileyboy3687 Год назад
@@MRPtech ah ok thank you and will give that a try
@mixtereE
@mixtereE 3 месяца назад
Dear Mr P: Can you provide the order of videos to have the ubuntu lxc template created and other settings needed to complete this tutorial? You mention that the ubuntu template was created in a previous video but I could not find it. Are you using a specific version of ubuntu 22.04, server or reguluar? Am I setting up the datacenter like you advise in your first proxmox video, to just have one pve and not local, local lvm and local network? You provide great content, just sometimes miss things that are crucial for us newbies. on another video I followed your guidance for a zfs cluster until I learned that my random old computer's mix of hardware could not run it- too late. Then I had to uninstall everything. It would be great to have some successes! thanks for doing this !
@MRPtech
@MRPtech 3 месяца назад
Hi, Setting up LXC Template : ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE--CtSNleMNfI.htmlsi=tsCuZ-URrQwKndxV If your setup has two drives inside, i suggest to remove Local-LVM and use 2nd drive to store your ISOs, Temaplate, VM Disks. 1st drive - leave that to Proxmox OS.
@mixtereE
@mixtereE 3 месяца назад
@@MRPtech Thanks. Got it up and running. For those other newbies there is a feature when you create an lxc that allows you to choose a template. I was under the impression that one had to be created, like in mr p's video in the proxmox playlist.
@swubutu
@swubutu 4 месяца назад
Hi MRP, i'm wondering if you are going to create a Tutorial Regarding Headscale ;)
@MRPtech
@MRPtech 4 месяца назад
I have already started to mess around with Headscale ... will see where this will take me ;)
@swubutu
@swubutu 4 месяца назад
@@MRPtech I'm sure you going to fix this ... i'm messing around aswel but for some ReasonS, every time a new error pops up during setup :D
@manologitech
@manologitech Год назад
Great
@SpikeCooks
@SpikeCooks 3 месяца назад
I can access the subroutes, however i cant connect to my truenas smb share? any settings I need to fiddle with in proxmox or the tailscale container to get it to work?
@SpikeCooks
@SpikeCooks 3 месяца назад
literally just solved it, but in my proxmox host, I went to firewall>add>macro>smb and it worked! hope this can help anyone else :)
@realabzhussain
@realabzhussain 7 месяцев назад
Do you have to enable subnets and exit node for EVERY machine in the network - or only 1 machine? Thanks
@CcnaLife
@CcnaLife 5 месяцев назад
good video but you didn't sht up for 1 second thruout the video... wish you took short breaks
@MRPtech
@MRPtech 5 месяцев назад
Agree. This one was more like speedrun
@DanielPostma-xn2yr
@DanielPostma-xn2yr 3 месяца назад
Hello, when i tried to ssh into the tailscale vm/ct. I get a erro Permission denied
@MRPtech
@MRPtech 3 месяца назад
Open your tailscale console via Proxmox and check file /etc/ssh/ssh_config check if line bellow is active (remove # from the start of that line) PasswordAuthentication yes This way you will be able to ssh into Tailscale VM/LXC using username + password.
@sonny8085
@sonny8085 5 месяцев назад
Why don't you just install Tailscale straight onto the Proxmox host?, instead of the need to create an LXC/VM?
@MRPtech
@MRPtech 5 месяцев назад
When i started to mess around with Proxmox, i used to install a lot of stuff directly to Proxmox HOST. And one day Proxmox stopped working. Was it because i installed other stuff on the HOST or something else ... don't know. Now i follow a rule - do not install anything on Proxmox HOST unless o have no other option. For example Zabbix - i had to install Zabbix agent on Proxmox host to monitor each node, for Tailscale - there is no extra benefits to have tailscale inside proxmox host compared to LXC.
@dominick253
@dominick253 Год назад
I tried it inside an lxc container and it threw kernel header errors. Switched to a vm and it works just fine 🙂
@MRPtech
@MRPtech Год назад
Error you where getting could be because LXC container was Unprivileged.
@theoqueiroz
@theoqueiroz 10 месяцев назад
Great video. I just have one question: at 08:16 do we need to add the advertise options everytime the server comes up or just for the first time? I get a warning message saying that UDP GRO forwarding is suboptimally configured on eth0. Thanks for this awesome step-by-step!
@MRPtech
@MRPtech 10 месяцев назад
During first initial setup you need to put advertising tag. If you restar lxc container, tailscale automatically will enable advertising on. If you run command "sudo tailscale down" and later you want to turn it on by running command "sudo tailscale up" you will have to add advertising on again as inside your tailscale net this node will be with advertising flag which means you need to initiate advertising again. I hope all this makes sense :)
@theoqueiroz
@theoqueiroz 10 месяцев назад
@@MRPtech Got it, thanks! Any info on that warning message?
@GimmeAll
@GimmeAll 4 месяца назад
@@theoqueiroz Did you ever figure it out, iam getting the same message ?
@kiptanoi4422
@kiptanoi4422 6 месяцев назад
Hello, I have a question. I am new to proxmox, container and so on.... I am wondering, If I could run 2 stuff in the same container? I have one container with lxc "turnkey mysql" running And after I watched your video I have one container lxc "Tailscale" running Can I do one single container with both tailscale running and mysql running on it? And how do I do that?
@MRPtech
@MRPtech 6 месяцев назад
If you want to have one LXC container with MySQL and Tailscale - i suggest to start with Ubuntu LXC container and install MySQL and Tailscale inside it. For more easier installation process i would go with Ubuntu Server VM.
@kiptanoi4422
@kiptanoi4422 6 месяцев назад
@@MRPtech Oh, cool thanks, do I win something in resourses and so on to have one single container that manage small stuff like MySQL and Tailscale in the same container, or do I want separate containers for MySQL and Tailscale running?
@mihleo6391
@mihleo6391 Год назад
Why dont you just use wireguard?
@MRPtech
@MRPtech Год назад
1. With Wireguard for some reason i get slower speed connecting to server from outside home network. With tailscale i get close to full speed 2. Tailscale is based on wireguard so technically i am using wireguard.
@nadpul
@nadpul Год назад
How to access proxmox and containers using hostname instead of IP? Thank you.
@MRPtech
@MRPtech Год назад
I am using tailscale and its feature called "smart dns" which resolves all my local IPs in to hostnames. Alternative would be to use PiHole and its Local DNS option.
@mikekane9734
@mikekane9734 Год назад
Thanks a lot! Question, did I miss the referred video with a remote system Remina/Guacamole? Or it is still in plans?
@MRPtech
@MRPtech Год назад
Remmina / Guacamole videos to come. as i have to publish couple videos in between to make more sense when you watching Remmina / Guacamole video.
@mikekane9734
@mikekane9734 Год назад
Thank you so much@@MRPtech ! Looking forward to it.
@mikekane9734
@mikekane9734 3 месяца назад
@@MRPtech Hi, I just re-watched this video. And still wondering if you shot that videos?
@rezenclowd3
@rezenclowd3 Месяц назад
Why are you doing a static IP in the dhcp pool? Your DHCP server now may assign the same IP to another computer.... Instead do a DHCP static mapping on your DHCP server and apply your MAC address, or do a static IP in the LXC outside of your DHCP server pool range. IE 192.168.1.1/24 is your LAN. Setup your DHCP pool to be 192.168.1.100-254. That way you have ~99 IPs to use for static IPs depending on where your Gateway is (could be 1.1, could be 1.254 or anywhere in between)
@MRPtech
@MRPtech Месяц назад
Yes, you can do that. I set static IP in LXC config as it is much easier and same for everyone. I can't explain each and every router configurations and how to complete them. Plus - tailscale LXC container is my gateway to home network from outside and it is always running and Proxmox HA setup done. Maximum downtime 5 - 10 min. DHCP server will release IP to another device if Tailscale LXC container will end up offline for 15 days.
@telefoonjoost
@telefoonjoost Год назад
For some reason after following your guide, when I enable advertise-route from the admin panel of tailsce, my entire home network doesn't have a data connection anymore. When I disable advertise routes the devices on my network can connect to the outside Internet again. Very strange... Do you have any idea?
@MRPtech
@MRPtech Год назад
1. On which side you do "advertise-routes" Inside LXC? 2. Once you have advertise-routes ON - are you confirming that inside tailscale Admin panel?
@wayland2837
@wayland2837 Год назад
Great video and thanks for making it. I followed you video precisely and I even double checked my work and I cannot access the proxmox admin console remotely. I can access the tailscale lcx container via ssh. What am I missing? Thanks again.
@MRPtech
@MRPtech Год назад
1. Do you have subnet advertising active on tailscale node? 2. If subnet advertising active, did you approved that via tailscale admin dashboard for that node?
@wayland2837
@wayland2837 Год назад
Yes I do have subnet advertising active on the tailscale node. I did approve the subnet advertising via the tailscale admin dashboard for the node.
@MRPtech
@MRPtech Год назад
How you trying to access proxmox dashboard. Via tailsclale IP or using local net IP 192.168.*.*:8006 ?
@snailprogrammer7483
@snailprogrammer7483 10 месяцев назад
Will this allow me to login to the PVE panel (port 8006) to view everything away from my house?
@MRPtech
@MRPtech 10 месяцев назад
Yes. As long device you are using to login is connected to same tailscale account as PVE tailscale instance
@kvmgz
@kvmgz Год назад
Hi there. Is there a way or a need to update the tailscale server itself? Or the apt update & upgrade resolves this?
@MRPtech
@MRPtech Год назад
Hi, apt update // upgrade will do that for you. When you installing tailscale via command line, tailscale repo URLs added to a list of all the repos that apt update/upgrade need to do, tailscale will be one of them.
@meh8995
@meh8995 Год назад
i followed the guide step by step but the tailscale doesn't work also kindly did u post the following video for the apps u mentioned at the end (remena guacamole?) 13:35
@MRPtech
@MRPtech Год назад
Remmina / Quacamole tutorial will be done. What errors do you get when trying to ping Tailscale IP ?
@meh8995
@meh8995 Год назад
@@MRPtech i wanna ask you what is a good way to access the OS of pve remotely without opening the panel of it
@meh8995
@meh8995 Год назад
@@MRPtech I fixed the tailscale, i think XD
@edgecrush3r
@edgecrush3r Год назад
Is there any way to tell my connected devices to us a local DNS server?
@MRPtech
@MRPtech Год назад
You need to install tailscale client on each device and login with same account to use DNS server. In my case i have local DNS server, this server IP is logged inside tailscale dashboard and any device (with tailscale client installed) hits that DNS server first before going to 1.1.1.1
@BeNtOoOoOo
@BeNtOoOoOo 2 месяца назад
Why not just run Wireguard without tailscale, i don't get why would people add an extra layer when wireguard works wonders.
@MRPtech
@MRPtech 2 месяца назад
wireguard make connection and that is it Tailscale add sooooo much moooore to just making a connection.
@BeNtOoOoOo
@BeNtOoOoOo 2 месяца назад
@@MRPtech it doesn't make a "connection" it makes a tunnel and a virtual network between the server and one or several clients. It also can route traffic from and to the LAN. So i really don't get what else tailscale can do...
@BeNtOoOoOo
@BeNtOoOoOo 2 месяца назад
@@MRPtech also, wireguard is 100% private, yours, non internet or outside dependant. Everything i need to my wireguard to work is my own wireguard server... Nothing else. Is it ease of use? I can't see other reason really.
@MRPtech
@MRPtech 2 месяца назад
Can wireguard: a) allow me to connect to wireguard nodes via SSH using browser? b) allow me to expose service to a public via tunnel? c) give me split DNS feature? d) provide me with custome domain? for example ibis-galaxy.net ? e) provide me an easy way to setup ASL rules?
@BeNtOoOoOo
@BeNtOoOoOo 2 месяца назад
@@MRPtech I don't think you understand how it works really... Wireguard it's a VPN, same as tailgate. ASL rules, split DNS and all you mentioned are handled by the server at your home. It just routes traffic to the tunnel, what you do with that traffic is up tou you... You want to split DNS? Then you just have to config it as such... You can do anything you want as if the client was in LAN, that's the point. You basicaly deal with wireguard trafic as you would deal with a VLAN. So yes... You can do all that and more, depends on your setup.
@bluesquadron593
@bluesquadron593 Год назад
Hi, I am facing this issue for " tailscale status # Health check: # - Some peers are advertising routes but --accept-routes is false" I cant ping the IPs from the routes IP range given in the LXC tailscale-up command.
@MRPtech
@MRPtech Год назад
1. Where is your main tailscale setup located? LXC/VM? 2. Which device you are using to try to ping local network IPs ? 3. Have you enabled "--advertise-routes=192.168.X.0/24" during first Tailscale run and turned on "IPV4 Forwarding" ?
@bluesquadron593
@bluesquadron593 Год назад
@@MRPtech Hi, followed your guide. So I have it in an lxc. I am getting this message from a remote server with tailscale on it. That server still can't ping anything in 192.168.1.0/24.
@bluesquadron593
@bluesquadron593 Год назад
@@MRPtech Ok, the solution was that on my other tailscale instances I had to spin down tailscale and bring them up with "tailscale up --accept-routes".
@wali8976
@wali8976 Год назад
is there a way to make your proxmox GUI available from anywhere without IPV4 forwarding?
@JesusFranco01
@JesusFranco01 Год назад
Yes. Cloudflare tunnel is a great way. Use the Applications Access feature to add additional layers of protection.
@meh8995
@meh8995 Год назад
@@JesusFranco01 any free way?
@JesusFranco01
@JesusFranco01 Год назад
@@meh8995 cloudflare tunnel has a free tier ;)
@petermarin
@petermarin 11 месяцев назад
why did you uncomment the permit root access part?
@MRPtech
@MRPtech 11 месяцев назад
Because i want to give SSH access to ROOT user. If i leave that commented, root user can't connect via SSH, only normal users will. This is not recommenced. If someone will guess root password and gain access via SSH, they will have access to entire system. I done it just out of convenience and not necessity
@petermarin
@petermarin 11 месяцев назад
@@MRPtech I appreciate the reply!! Can you show us the alternative that’s more secure? (New to this)
@MRPtech
@MRPtech 11 месяцев назад
Instead of using root you can login with normal user. If you don't have a user created: first - login as user and type adduser Finish setting this up, next you need to add user to SUDO group, command: usermod -aG sudo On next fresh USER login SUDO will be activated. Now you can SSH with user instead of ROOT. Suggestion - create SSH keys for better security.
@kill_screen
@kill_screen 6 месяцев назад
Great guide, thanks alot
@petermarin
@petermarin Месяц назад
Do you still needs that change in the proxmox configuration if you’re doing this into a VM?
@MRPtech
@MRPtech Месяц назад
No. With VM you don't need to do that.
@Bansmax
@Bansmax 3 месяца назад
Works perfectly - thank you very much! Do you ever feel weird that Talescale is hosted by a 3rd party?
@MRPtech
@MRPtech 2 месяца назад
to be honest ... i don't mind. As long as it works when i need to use it ... i am fine with that. Haven't said that, i am messing round with headscale - self-hosted tailscale server. This way i can host everything in my server, but at this moment i am not confident that i can do that fully and migrate all my connection to self-hosted state.
@Bansmax
@Bansmax 2 месяца назад
@@MRPtech nice one! After using Tailscale for a week - it’s been a treat. So easy to use! Do you have an automated torrent setup on your proxmox?
@Montagic
@Montagic 9 месяцев назад
Got this setup and everything connected, but I can't seem to figure out how to get my phone to connect over my data. I think it's working as I'm able to access my VMs from other VLANs like IoT and Guest, but not when I disconnect from wifi. I'm running Arista NG Firewall (untangled) so not sure if maybe that could be blocking things.
@MRPtech
@MRPtech 9 месяцев назад
Hi, Have you turned "--advertise-routes" option during initial "tailscale up" setup?
@Montagic
@Montagic 9 месяцев назад
@@MRPtech Fixed it! Turns out it doesn't work if you are using it as an exit node on data. Not sure if that is a bug or feature..still new to how all of this works haha
@caffeinatedw-w
@caffeinatedw-w 10 месяцев назад
I finally was able to follow your video and setup Tailscale. Thanks a lot for this helpful video! I have a quick question btw, is router-advertising for the whole LAN devices a security concern? Let’s say I want to exclude one LXC from being exposed in Tailscale, is there any rule that I can set up? Many thanks!
@MRPtech
@MRPtech 10 месяцев назад
Yes. but it is not that easy to tell in words. Basically - setting up Tailscale ACL security and assigning tags to your tailscale NODES. For example TAG_1 can only access TAG_2 and TAG_3 machines. if you LXC container is tagged with TAG_4 that makes it outside allowed list and can't be accessed. I am planning to get that video done over weekend in hope to be live by mid next week.
@caffeinatedw-w
@caffeinatedw-w 10 месяцев назад
@@MRPtech Thank you, I ended up setting specific IP being exposed like this, tailscale set --advertise-routes=192.168.68.x/32,192.168.68.x2/32,192.168.68.x3/32
@MRPtech
@MRPtech 10 месяцев назад
ok. i didn't know that. You can expose single IP instead of all network o.O? Well ... learn new thing every day. Thank you for sharing that !
@daviduartecarvalho2796
@daviduartecarvalho2796 10 месяцев назад
Thank you!
Далее
Help Me Celebrate! 😍🙏
00:35
Просмотров 13 млн
We finally APPROVED @ZachChoi
00:31
Просмотров 3,2 млн
Don’t run Proxmox without these settings!
25:45
Просмотров 221 тыс.
What's ACTUALLY running in my Homelab?
19:21
Просмотров 191 тыс.
Secure authentication for EVERYTHING! // Authentik
39:50
Remotely access and share your self-hosted services
18:05
Self Host Tailscale with Headscale - How To Setup
21:51