The game-changing difference for me is that I use Tailsscale to map network drives away from home using their Tailscale-assigned machine name - which is amazingly useful because it means the mapping stays the same regardless of whether I'm actually at home with my router's assigned IP address, or away, with my VPN's assigned IP address. I had problems with mapped drives using OpenVPN, but with Tailscale set to 'Run unattended' I no longer have to think about it.
Really like the video! One critique: the video title has a misspelling and seems somewhat inaccurate. Instead of "Tailscale vs OpenVPN: What is the BEST was to secure your NAS?" I suggest the following: "Tailscale vs OpenVPN: What is the BEST way to remotely connect to your NAS?" A title like that seems better in my opinion👍
I wish you were around 30 years ago when I struggled to manage Novell networks and the only learning resources were textbooks that started with "The 7 layers of the OSI model".
I use to use Open VPN but switched to Wireguard which is another alternative to Open VPN. I use Tailscale mostly with family and friends. It does work with Wireguard under the hood. But for me remoting back into my network I use self hosted Wireguard VPN.
So how would I use Synology DS Cam with Tailscale? Do I first install Tailscale on the Synology NAS and then install the Tailscale app on my Android phone and somehow connect them?
cost wise: you add container with headscale or even a package and you have unlimited tailscale for free. tailscale client is free and Tailscale company only charges for server services. So headscale is your answer. I implemented few such scenarios - all work like a charm The same is with security: headscale solves this problem completely. I am surprised you did not mention it at all.
Месяц назад
Can you host Headscale on a Synology or does it need a domain? I can find any video on setting it up on Synology...while both tailscale and openvpn are integrated to be used inside synology. I rather host Headscale tho... but I am not tech savy.
While I agree it's not necessarily ideal just on principle, opening a single UDP port for Wireguard with a pre-shared key etc. is still a very low risk, considering the nature of UDP itself and WireGuard
So, with Tailscale VPN my file transfer from home NAS to work NAS are going through the Tailscale server? I don't want anything between my NAS to NAS connection.
They go through Tailscale relay severs (if not direct connection) in the same way that your network traffic routes through the 30+ routers on the internet between your ISP’s routers
Thanks for the video. To work remote on the nas you always need download the files first. Specially with MS office documents this is a big hassle. How do you solve this?
I like Open VPN... however the latest version of OPENVPNConnect has issues with OpenVPN on Synology. I have to use an Older version of the client to be able to VPN into my synology
If I successfully connect to Tailscale without any alteration. Does this mean I made a direct connect? Or can the relay unknowingly get connected? Is there a query to prove which one is being used?
I had tailscale installed but took fear of it when I added a friend to my tailscale and they said they could see my local files . Did I do something wrong
I use both.
Tailscale for my offsite backup & it's really to setup!
OpenVPN to access to other servers in home network or offsite network.
Nice video!
After spending a month to setup openvpn on synology Finally I use tailscale and I am happy.
The game-changing difference for me is that I use Tailsscale to map network drives away from home using their Tailscale-assigned machine name - which is amazingly useful because it means the mapping stays the same regardless of whether I'm actually at home with my router's assigned IP address, or away, with my VPN's assigned IP address.
I had problems with mapped drives using OpenVPN, but with Tailscale set to 'Run unattended' I no longer have to think about it.
Really like the video! One critique: the video title has a misspelling and seems somewhat inaccurate. Instead of "Tailscale vs OpenVPN: What is the BEST was to secure your NAS?" I suggest the following: "Tailscale vs OpenVPN: What is the BEST way to remotely connect to your NAS?" A title like that seems better in my opinion👍
I wish you were around 30 years ago when I struggled to manage Novell networks and the only learning resources were textbooks that started with "The 7 layers of the OSI model".
I use to use Open VPN but switched to Wireguard which is another alternative to Open VPN. I use Tailscale mostly with family and friends. It does work with Wireguard under the hood. But for me remoting back into my network I use self hosted Wireguard VPN.
WOW! I was literally thinking about this!!!! Thanks Space!
Another fantastic video! Thank you for all of your hard work. Really informative.
Tailscale ftw. The ACL feature of tailscale is really the game changer for me. So powerful and easy to use once you get the hang of it.
For me, Tailscale is perfect for accessing home lab & Synology NAS from anywhere. Or I can just use UniFi Teleport. 😊
Thank you for the evaluation!
Great video!
thanks, brillant video !
Terrific video as always!
Awesome video. Does your advice on Open VPN CloudConexa change your pros and cons on this topic?
So how would I use Synology DS Cam with Tailscale? Do I first install Tailscale on the Synology NAS and then install the Tailscale app on my Android phone and somehow connect them?
BTW from looking at the screenshot of your Tailscale Admin console it shows that tailscale client update available on all your clients.
cost wise: you add container with headscale or even a package and you have unlimited tailscale for free. tailscale client is free and Tailscale company only charges for server services. So headscale is your answer. I implemented few such scenarios - all work like a charm
The same is with security: headscale solves this problem completely.
I am surprised you did not mention it at all.
Can you host Headscale on a Synology or does it need a domain? I can find any video on setting it up on Synology...while both tailscale and openvpn are integrated to be used inside synology. I rather host Headscale tho... but I am not tech savy.
Privacy, openvpn won... but what if I run my own tail scale server?
Great review bro! 👊
I hear NetBird is similar and can be self-hosted
9:57 How do you attain a direct connection with Tailscale??
While I agree it's not necessarily ideal just on principle, opening a single UDP port for Wireguard with a pre-shared key etc. is still a very low risk, considering the nature of UDP itself and WireGuard
Would Cloudflare Tunnel work? I'd love to hear your opinion on it and if you think it's applicable here. thanks!
Thanks.
Do you have a link to the offsite backup write-up you mentioned at 24:00?
My synologys would not connect to each other using their tailnet ip. Don’t know why
So, with Tailscale VPN my file transfer from home NAS to work NAS are going through the Tailscale server? I don't want anything between my NAS to NAS connection.
They go through Tailscale relay severs (if not direct connection) in the same way that your network traffic routes through the 30+ routers on the internet between your ISP’s routers
@@SpaceRexWill Thank you for your reply Will, I really appreciate it. I forgot the move from A to B ALWAYS goes through ISP :)
What about ZeroTier? It works flawless on my Synology NAS
Thanks for the video. To work remote on the nas you always need download the files first. Specially with MS office documents this is a big hassle. How do you solve this?
I like Open VPN... however the latest version of OPENVPNConnect has issues with OpenVPN on Synology.
I have to use an Older version of the client to be able to VPN into my synology
Don’t know if you noticed the typo in the title
If I successfully connect to Tailscale without any alteration. Does this mean I made a direct connect? Or can the relay unknowingly get connected? Is there a query to prove which one is being used?
Why would you mention tailscale. Why not just use wireguard
I still prefer using my own self hosted Wireguard VPN server when accessing my network remotely. No 3rd party company for me! 🤮
And how do they compare to Wireguard?
I believe Tailscale uses wireguard.
I had tailscale installed but took fear of it when I added a friend to my tailscale and they said they could see my local files . Did I do something wrong
That can happen if you did not ser ir up correctly. Check users permission and put your files in home folder, not homes
why would you use either on the NAS level compared to the firewall level of things?
For offices, having user authentication through the NAS is very nice
My question is, if I have a router that offers VPN such as ubiquiti, is there any upside to having a NAS host it instead of the router?
I use it for user authentication for offices all the time. Way easier
Plus easier to manage SSL certificates
What's the keyboard you use?
Rex, I installed Tailscale on my NAS and I got stuck LOL. I can't access my NAS, please help?
I prefer Perimeter81.