Tailscale inside LXC | Secure remote access to your server | Proxmox Home Server | Home Lab

Поделиться
HTML-код
  • Опубликовано: 28 окт 2024

Комментарии • 155

  • @thehostler0
    @thehostler0 6 месяцев назад +7

    Even though the video is just over a year old by now, the steps are exactly the same. I've followed your guide and ran into zero issues. Thank you :)

  • @paul9812-t3i
    @paul9812-t3i Год назад +23

    Dude, you're an absolute legend. What a well explained, easy to follow tutorial. Brilliant stuff! Thank you

  • @KristijanDujakovic
    @KristijanDujakovic 4 месяца назад +2

    Fantastic! Tried so many of the Tailscale Guides...this works from scratch, super easy 👍

  • @QEDAGI
    @QEDAGI 5 месяцев назад +2

    Don't know why I'd put off routing for a Proxmox server on my tailnet. You made it look so simple, I did it right away. Thanks!

  • @NickSale-q6y
    @NickSale-q6y 5 месяцев назад +2

    Successfully installed Tailscale on a LXC thanks to you! Thank you!

  • @BeYourselfMan
    @BeYourselfMan 11 месяцев назад +3

    Mr P, you are AMAZING!!!!! Big hug from Portugal. It works flawlessly.

  • @MrSamyWageh
    @MrSamyWageh Год назад +6

    This video is a life saver as I was looking for a VPN solution. As usual, detailed instructions and great guide. Thanks MRP.

  • @hotrodhunk7389
    @hotrodhunk7389 Год назад +7

    I've tried so many other VPNs. Nothing worked with my cg-nat. But tailscale had zero problems finding a path. Works flawlessly for me.

  • @MarcelodeSouzaSilva
    @MarcelodeSouzaSilva Год назад +4

    Great! Looking forward to the next video showing how to use Guacamole in this container...

  • @mijkal
    @mijkal Год назад +5

    Excellent guide - thank you! Got everything functioning in a Proxmox LXC by following along.

  • @rasbe6863
    @rasbe6863 11 месяцев назад +2

    Thank you so much for your video. This is one of the most clear and concise videos I found so far to set this up.

  • @gasparem16
    @gasparem16 Год назад +6

    Absolutely great video! Clear, easy to follow and down to business :) Thanks a lot!

  • @carlrudner
    @carlrudner 5 месяцев назад +4

    The only way i have managed to get tailscale to work on my home server! Thanks for this walk through.

  • @MartinHyett
    @MartinHyett 10 месяцев назад

    Thanks @MRPtech for such a useful video. It explained in exactly the right level of detail so I could get my Tailscale instance up and running in Proxmox, after previously struggling a bit with some of the steps needed.
    My only stumble was getting access to my LAN from my phone. It took me a while to realise that I needed to allow it to use the exit node. Then all worked perfectly!

    • @MRPtech
      @MRPtech  10 месяцев назад +1

      Your welcome.
      Exit node will route all your traffic from your phone via your home network. Imagen it as VPN (Nord VM, Private Internet Access VPN and others). This is useful when you connected to public WiFi and all traffic goes from your phone back to your home network and then via ISP router to internet. I found this sometimes a bit slow as it need to go from my phone/laptop > home > router > ISP > internet
      If you want to access home network without Exit node, your tailscale instance at home can be converted into route-advertise node. Which makes that if you time local ip address for example 192.168.123.456 - tailscale will take that and push all traffic to your home network and everything else will go to World Wide Web.

    • @MartinHyett
      @MartinHyett 10 месяцев назад

      Good point. I don't want to route internet traffic that way, just access those machines on my local network. So I guess I just need to use the advertise-routes argument and not the advertise-exit-node. I'm slowly beginning to understand it better. I hope!

  • @dimitristsoutsouras2712
    @dimitristsoutsouras2712 Год назад +1

    Nice presentation. I think you could also mention and make this guide more inclusive, by showing the way to create split or full tunnels for the clients.

  • @Heilzmaker
    @Heilzmaker 17 дней назад

    Exactly what I was looing for, thank you

  • @KorayKüpe
    @KorayKüpe Месяц назад

    Great tutorial, thanks a lot. I am unable to use Homekit Bridge with this setup. I enter the homekit pair code and it says unable to add accessories. What may be the problem?

  • @hristoistoyanov
    @hristoistoyanov 3 месяца назад +1

    Best tutorial ever!

  • @noquierounhandle
    @noquierounhandle Год назад

    Thank you so much for this tutorial. Clear as water!

  • @pr0jectSkyneT
    @pr0jectSkyneT 11 месяцев назад +1

    Just found your channel. This video was very helpful to me. Subscribed

  • @HenriqueZacchi
    @HenriqueZacchi Год назад

    Excellent video. Short and precise!

  • @jorgesoto7783
    @jorgesoto7783 6 месяцев назад

    Thanks a lot, worked like a treat!

  • @Redd00
    @Redd00 Год назад

    Really amazing work and for something i havent ever thought of or used before! works great and the video was awesome

  • @rogerrogerovo2760
    @rogerrogerovo2760 5 месяцев назад

    the follow up video when? :) but a really good proxmox playlist you got here

  • @tonyMmonje
    @tonyMmonje 9 месяцев назад

    exactly what I am looking for. thank you

  • @strix4040
    @strix4040 11 месяцев назад

    Absolutely great video, thank you

  • @hypernarutouzumaki
    @hypernarutouzumaki 6 месяцев назад

    Hey,
    I really liked the setup!
    Could you also please do the promised video on setting up Guacamole that goes hand in hand with this tailscale setup?

  • @אדירטראבלסי
    @אדירטראבלסי 7 дней назад

    a big LIKE!

  • @oztechsolutions
    @oztechsolutions 6 месяцев назад

    Great video... thanks!
    Can you clear out something for me. Why do you need to SSH into that LXC container when you are already login on the terminal via proxmox?

  • @smneamat
    @smneamat Год назад

    Excellent ! Thank you so much. :)

  • @sp4m3r
    @sp4m3r 7 месяцев назад

    Great video! thank you very much. What would you say regarding security? I mean opening tailscale to access the whole home network?. Thanks!

  • @YourWizBlog
    @YourWizBlog Год назад

    Thank you so much for this excellent video. Worked like charm. For others, what I did not know is that you can access all remote IP's in that network directly from your computer if they are both connected to tailscale. Not sure what happens if both of the networks share the same IP range... but that is not the case for me.

    • @MRPtech
      @MRPtech  Год назад

      What happened with your setup is "subnet advertising"
      Let's say you have two devices and they are 1000 miles apart. One is in Europe and another one in US.
      Both are connected to same Tailscale Tailnet.
      You have turned on in EUROPE server. that means that when you connecting from US to Europe server you can access not only Europe server but all other devices that are in same network as Europe server.
      I hope that make sense

    • @MikeDeVincentis
      @MikeDeVincentis 4 месяца назад

      He's asking what happens when both sides have the same network scheme, like 192.168.1.x on both sides. Can you still access or will you have to change one of the networks?

  • @gabscar1
    @gabscar1 6 месяцев назад

    Great video. Subscribed!

  • @joelcriollo3427
    @joelcriollo3427 Год назад

    Thanks bro! i really appreciate your video! It-s very helpful! Blessings!

  • @Bansmax
    @Bansmax 4 месяца назад

    Works perfectly - thank you very much! Do you ever feel weird that Talescale is hosted by a 3rd party?

    • @MRPtech
      @MRPtech  4 месяца назад +1

      to be honest ... i don't mind. As long as it works when i need to use it ... i am fine with that. Haven't said that, i am messing round with headscale - self-hosted tailscale server. This way i can host everything in my server, but at this moment i am not confident that i can do that fully and migrate all my connection to self-hosted state.

    • @Bansmax
      @Bansmax 3 месяца назад

      @@MRPtech nice one! After using Tailscale for a week - it’s been a treat. So easy to use!
      Do you have an automated torrent setup on your proxmox?

  • @ren3059
    @ren3059 10 месяцев назад

    Your video was incredibly helpful, and I want to express my gratitude. Thank you so much!

  • @daledroid
    @daledroid Год назад

    good work and explanation mrp, waiting for next video about guacamole

    • @meh8995
      @meh8995 Год назад

      did he post it?

    • @yarekm4270
      @yarekm4270 Год назад

      @@meh8995 im waiting as well

  • @cyrilpinto418
    @cyrilpinto418 4 месяца назад

    Hi your videos are amazing; could you consider making a video on Wireguard within a Container on a proxmox? Much appreciated.

  • @riskyrun
    @riskyrun Год назад +2

    Can I access the proxmox web UI from outside the LAN using tailscale?

  • @petermarin
    @petermarin 2 месяца назад

    Do you still needs that change in the proxmox configuration if you’re doing this into a VM?

  • @realabzhussain
    @realabzhussain 8 месяцев назад

    Do you have to enable subnets and exit node for EVERY machine in the network - or only 1 machine? Thanks

  • @hprompt166
    @hprompt166 10 часов назад

    hi there,
    got this working, how do I get the tailscale lxc to advertise the routes and exit node after a reboot

  • @rodrigobarbosa6381
    @rodrigobarbosa6381 2 месяца назад

    thank you a lot!!

  • @swubutu
    @swubutu 9 месяцев назад

    thanks for this tutorial ... Its Kungfu Magic !!!

  • @BobWorrall
    @BobWorrall 4 месяца назад

    very clean

  • @theoqueiroz
    @theoqueiroz 11 месяцев назад

    Great video. I just have one question: at 08:16 do we need to add the advertise options everytime the server comes up or just for the first time?
    I get a warning message saying that UDP GRO forwarding is suboptimally configured on eth0.
    Thanks for this awesome step-by-step!

    • @MRPtech
      @MRPtech  11 месяцев назад +1

      During first initial setup you need to put advertising tag.
      If you restar lxc container, tailscale automatically will enable advertising on.
      If you run command "sudo tailscale down" and later you want to turn it on by running command "sudo tailscale up" you will have to add advertising on again as inside your tailscale net this node will be with advertising flag which means you need to initiate advertising again.
      I hope all this makes sense :)

    • @theoqueiroz
      @theoqueiroz 11 месяцев назад

      @@MRPtech Got it, thanks! Any info on that warning message?

    • @GimmeAll
      @GimmeAll 5 месяцев назад +1

      @@theoqueiroz Did you ever figure it out, iam getting the same message ?

  • @daviduartecarvalho2796
    @daviduartecarvalho2796 11 месяцев назад

    Thank you!

  • @caffeinatedw-w
    @caffeinatedw-w 11 месяцев назад

    I finally was able to follow your video and setup Tailscale. Thanks a lot for this helpful video!
    I have a quick question btw, is router-advertising for the whole LAN devices a security concern? Let’s say I want to exclude one LXC from being exposed in Tailscale, is there any rule that I can set up? Many thanks!

    • @MRPtech
      @MRPtech  11 месяцев назад +2

      Yes. but it is not that easy to tell in words.
      Basically - setting up Tailscale ACL security and assigning tags to your tailscale NODES.
      For example TAG_1 can only access TAG_2 and TAG_3 machines. if you LXC container is tagged with TAG_4 that makes it outside allowed list and can't be accessed.
      I am planning to get that video done over weekend in hope to be live by mid next week.

    • @caffeinatedw-w
      @caffeinatedw-w 11 месяцев назад +1

      @@MRPtech Thank you, I ended up setting specific IP being exposed like this, tailscale set --advertise-routes=192.168.68.x/32,192.168.68.x2/32,192.168.68.x3/32

    • @MRPtech
      @MRPtech  11 месяцев назад +1

      ok. i didn't know that. You can expose single IP instead of all network o.O?
      Well ... learn new thing every day.
      Thank you for sharing that !

  • @ryd3v
    @ryd3v 4 месяца назад

    just wondering why allow root ssh login, when you can use ssh authorized key instead?

  • @baileyboy3687
    @baileyboy3687 Год назад

    Good video and step by step very informative. So, the video just seemed to finish. How do we actually connect to our different home machines from outside world?

    • @MRPtech
      @MRPtech  Год назад +1

      Because tailscale lxc has subnet advertising on. using any other device with tailscale install and same account used to login you can access your local network devices from anywhere in the world.
      I have tailscale app on my phone. and used same account to login. now i can access home NAS from anywhere in the world because tailscale lxc has --advertise-routes ON

    • @baileyboy3687
      @baileyboy3687 Год назад

      @@MRPtech ah ok thank you and will give that a try

  • @mikekane9734
    @mikekane9734 Год назад

    Thanks a lot! Question, did I miss the referred video with a remote system Remina/Guacamole? Or it is still in plans?

    • @MRPtech
      @MRPtech  Год назад +1

      Remmina / Guacamole videos to come. as i have to publish couple videos in between to make more sense when you watching Remmina / Guacamole video.

    • @mikekane9734
      @mikekane9734 Год назад

      Thank you so much@@MRPtech ! Looking forward to it.

    • @mikekane9734
      @mikekane9734 4 месяца назад

      @@MRPtech Hi, I just re-watched this video. And still wondering if you shot that videos?

  • @mixtereE
    @mixtereE 4 месяца назад

    Dear Mr P: Can you provide the order of videos to have the ubuntu lxc template created and other settings needed to complete this tutorial? You mention that the ubuntu template was created in a previous video but I could not find it. Are you using a specific version of ubuntu 22.04, server or reguluar? Am I setting up the datacenter like you advise in your first proxmox video, to just have one pve and not local, local lvm and local network? You provide great content, just sometimes miss things that are crucial for us newbies. on another video I followed your guidance for a zfs cluster until I learned that my random old computer's mix of hardware could not run it- too late. Then I had to uninstall everything. It would be great to have some successes! thanks for doing this !

    • @MRPtech
      @MRPtech  4 месяца назад

      Hi,
      Setting up LXC Template : ruclips.net/video/-CtSNleMNfI/видео.htmlsi=tsCuZ-URrQwKndxV
      If your setup has two drives inside, i suggest to remove Local-LVM and use 2nd drive to store your ISOs, Temaplate, VM Disks. 1st drive - leave that to Proxmox OS.

    • @mixtereE
      @mixtereE 4 месяца назад

      @@MRPtech Thanks. Got it up and running. For those other newbies there is a feature when you create an lxc that allows you to choose a template. I was under the impression that one had to be created, like in mr p's video in the proxmox playlist.

  • @SB-qm5wg
    @SB-qm5wg 6 месяцев назад

    Good video. TY

  • @netelijah
    @netelijah Год назад +1

    can you make a video on setting jellyfine, with sonarr and radarr on proxmox using truenas as the storage. please thanks

    • @TheStealthbob
      @TheStealthbob Год назад +1

      Doing the same now...Truecharts while easy at first are a hot mess when they change. Migrating everything off of Truenas

  • @stephenlau3690
    @stephenlau3690 6 месяцев назад

    Unfortunately, tailscale conflicts to smb in synology nas, the intranet transfer will drop to 0kb once tailscale on in nas.😢 Any way to avoid it?

  • @krumelmonstertv2266
    @krumelmonstertv2266 Год назад

    Thank you so much

  • @gentillidiego
    @gentillidiego 3 месяца назад

    incredible

  • @wayland2837
    @wayland2837 Год назад

    Great video and thanks for making it. I followed you video precisely and I even double checked my work and I cannot access the proxmox admin console remotely. I can access the tailscale lcx container via ssh. What am I missing? Thanks again.

    • @MRPtech
      @MRPtech  Год назад

      1. Do you have subnet advertising active on tailscale node?
      2. If subnet advertising active, did you approved that via tailscale admin dashboard for that node?

    • @wayland2837
      @wayland2837 Год назад

      Yes I do have subnet advertising active on the tailscale node. I did approve the subnet advertising via the tailscale admin dashboard for the node.

    • @MRPtech
      @MRPtech  Год назад

      How you trying to access proxmox dashboard. Via tailsclale IP or using local net IP 192.168.*.*:8006 ?

  • @SpikeCooks
    @SpikeCooks 4 месяца назад

    I can access the subroutes, however i cant connect to my truenas smb share? any settings I need to fiddle with in proxmox or the tailscale container to get it to work?

    • @SpikeCooks
      @SpikeCooks 4 месяца назад

      literally just solved it, but in my proxmox host, I went to firewall>add>macro>smb and it worked! hope this can help anyone else :)

  • @iamdiego87
    @iamdiego87 3 месяца назад

    With your very food guide I was able to install tailscale in a Proxmox lxc. But how can I access my proxmox VM remotely? Es. In one VM I've installed home assistant and I would like to access It from my phone where I've installed tailscale.

    • @MRPtech
      @MRPtech  3 месяца назад +1

      You need to switch advertising-routes=A.B.C.0/24 inside that tailscale. And switch that option on in tailscale dashboard. Once you done that you can access all services that are in home network from you phone from anywhere in a world as long as you have tailscale running in your home lab and your phone.

  • @kiptanoi4422
    @kiptanoi4422 7 месяцев назад

    Hello, I have a question.
    I am new to proxmox, container and so on....
    I am wondering, If I could run 2 stuff in the same container?
    I have one container with lxc "turnkey mysql" running
    And after I watched your video I have one container lxc "Tailscale" running
    Can I do one single container with both tailscale running and mysql running on it?
    And how do I do that?

    • @MRPtech
      @MRPtech  7 месяцев назад

      If you want to have one LXC container with MySQL and Tailscale - i suggest to start with Ubuntu LXC container and install MySQL and Tailscale inside it. For more easier installation process i would go with Ubuntu Server VM.

    • @kiptanoi4422
      @kiptanoi4422 7 месяцев назад

      @@MRPtech Oh, cool thanks, do I win something in resourses and so on to have one single container that manage small stuff like MySQL and Tailscale in the same container, or do I want separate containers for MySQL and Tailscale running?

  • @rodrigopereira7365
    @rodrigopereira7365 6 месяцев назад

    TY so much

  • @kvmgz
    @kvmgz Год назад

    Hi there. Is there a way or a need to update the tailscale server itself? Or the apt update & upgrade resolves this?

    • @MRPtech
      @MRPtech  Год назад +1

      Hi,
      apt update // upgrade will do that for you.
      When you installing tailscale via command line, tailscale repo URLs added to a list of all the repos that apt update/upgrade need to do, tailscale will be one of them.

  • @telefoonjoost
    @telefoonjoost Год назад

    For some reason after following your guide, when I enable advertise-route from the admin panel of tailsce, my entire home network doesn't have a data connection anymore. When I disable advertise routes the devices on my network can connect to the outside Internet again. Very strange... Do you have any idea?

    • @MRPtech
      @MRPtech  Год назад

      1. On which side you do "advertise-routes"
      Inside LXC?
      2. Once you have advertise-routes ON - are you confirming that inside tailscale Admin panel?

  • @Montagic
    @Montagic 10 месяцев назад

    Got this setup and everything connected, but I can't seem to figure out how to get my phone to connect over my data. I think it's working as I'm able to access my VMs from other VLANs like IoT and Guest, but not when I disconnect from wifi. I'm running Arista NG Firewall (untangled) so not sure if maybe that could be blocking things.

    • @MRPtech
      @MRPtech  10 месяцев назад

      Hi,
      Have you turned "--advertise-routes" option during initial "tailscale up" setup?

    • @Montagic
      @Montagic 10 месяцев назад

      @@MRPtech Fixed it! Turns out it doesn't work if you are using it as an exit node on data. Not sure if that is a bug or feature..still new to how all of this works haha

  • @snailprogrammer7483
    @snailprogrammer7483 11 месяцев назад

    Will this allow me to login to the PVE panel (port 8006) to view everything away from my house?

    • @MRPtech
      @MRPtech  11 месяцев назад

      Yes. As long device you are using to login is connected to same tailscale account as PVE tailscale instance

  • @swubutu
    @swubutu 5 месяцев назад

    Hi MRP,
    i'm wondering if you are going to create a Tutorial Regarding Headscale ;)

    • @MRPtech
      @MRPtech  5 месяцев назад +1

      I have already started to mess around with Headscale ... will see where this will take me ;)

    • @swubutu
      @swubutu 5 месяцев назад

      @@MRPtech I'm sure you going to fix this ...
      i'm messing around aswel but for some ReasonS, every time a new error pops up during setup :D

  • @DanielPostma-xn2yr
    @DanielPostma-xn2yr 4 месяца назад

    Hello, when i tried to ssh into the tailscale vm/ct. I get a erro Permission denied

    • @MRPtech
      @MRPtech  4 месяца назад

      Open your tailscale console via Proxmox and check file /etc/ssh/ssh_config
      check if line bellow is active (remove # from the start of that line)
      PasswordAuthentication yes
      This way you will be able to ssh into Tailscale VM/LXC using username + password.

  • @heromasum
    @heromasum 4 месяца назад

    Where's the remotely access proxmox server and container/lxc video?

  • @vitezism
    @vitezism 13 дней назад

    I thought port forwarding is less secure? What is the port forwarding here doing? The ponit of VPN is to not open ports.

    • @MRPtech
      @MRPtech  13 дней назад

      There is no need to open a port for tailscale to function. Where in a video am I explaining that we need to "open a port" ?

    • @vitezism
      @vitezism 13 дней назад

      @@MRPtech At 6:05 you are removing comments from something about forwarding, so I didn't understand that part.

    • @MRPtech
      @MRPtech  13 дней назад +2

      that is not port forwarding, that is IP forwarding. By doing that you can use tailscale feature which is call "subner-routing"
      tailscale.com/kb/1019/subnets
      Let's say you have a smart fridge with web UI which you can ONLY access while you at home. But what if you want to access that UI when you are not at home?
      subnet routing allows tailscale nodes to see all local network devices.
      You can achieve same results with VPN. With Tailscale, you don't need to do any key generation, user creadentials ect. If you have tailcale node inside network and subner-route is configured correctly - all network devices are visible to all tailscale devices.
      btw - Tailscale allows ACL for better permission control.

  • @bluesquadron593
    @bluesquadron593 Год назад

    Hi, I am facing this issue for " tailscale status
    # Health check:
    # - Some peers are advertising routes but --accept-routes is false"
    I cant ping the IPs from the routes IP range given in the LXC tailscale-up command.

    • @MRPtech
      @MRPtech  Год назад

      1. Where is your main tailscale setup located? LXC/VM?
      2. Which device you are using to try to ping local network IPs ?
      3. Have you enabled "--advertise-routes=192.168.X.0/24" during first Tailscale run and turned on "IPV4 Forwarding" ?

    • @bluesquadron593
      @bluesquadron593 Год назад

      @@MRPtech Hi, followed your guide. So I have it in an lxc. I am getting this message from a remote server with tailscale on it. That server still can't ping anything in 192.168.1.0/24.

    • @bluesquadron593
      @bluesquadron593 Год назад +1

      @@MRPtech Ok, the solution was that on my other tailscale instances I had to spin down tailscale and bring them up with "tailscale up --accept-routes".

  • @manologitech
    @manologitech Год назад

    Great

  • @meh8995
    @meh8995 Год назад

    i followed the guide step by step but the tailscale doesn't work also kindly did u post the following video for the apps u mentioned at the end (remena guacamole?) 13:35

    • @MRPtech
      @MRPtech  Год назад

      Remmina / Quacamole tutorial will be done.
      What errors do you get when trying to ping Tailscale IP ?

    • @meh8995
      @meh8995 Год назад

      @@MRPtech i wanna ask you what is a good way to access the OS of pve remotely without opening the panel of it

    • @meh8995
      @meh8995 Год назад

      @@MRPtech I fixed the tailscale, i think XD

  • @wali8976
    @wali8976 Год назад

    is there a way to make your proxmox GUI available from anywhere without IPV4 forwarding?

    • @JesusFranco01
      @JesusFranco01 Год назад

      Yes. Cloudflare tunnel is a great way. Use the Applications Access feature to add additional layers of protection.

    • @meh8995
      @meh8995 Год назад

      @@JesusFranco01 any free way?

    • @JesusFranco01
      @JesusFranco01 Год назад

      @@meh8995 cloudflare tunnel has a free tier ;)

  • @nadpul
    @nadpul Год назад

    How to access proxmox and containers using hostname instead of IP? Thank you.

    • @MRPtech
      @MRPtech  Год назад

      I am using tailscale and its feature called "smart dns" which resolves all my local IPs in to hostnames.
      Alternative would be to use PiHole and its Local DNS option.

  • @dominick253
    @dominick253 Год назад

    I tried it inside an lxc container and it threw kernel header errors. Switched to a vm and it works just fine 🙂

    • @MRPtech
      @MRPtech  Год назад +1

      Error you where getting could be because LXC container was Unprivileged.

  • @edgecrush3r
    @edgecrush3r Год назад

    Is there any way to tell my connected devices to us a local DNS server?

    • @MRPtech
      @MRPtech  Год назад +1

      You need to install tailscale client on each device and login with same account to use DNS server.
      In my case i have local DNS server, this server IP is logged inside tailscale dashboard and any device (with tailscale client installed) hits that DNS server first before going to 1.1.1.1

  • @sonny8085
    @sonny8085 6 месяцев назад

    Why don't you just install Tailscale straight onto the Proxmox host?, instead of the need to create an LXC/VM?

    • @MRPtech
      @MRPtech  6 месяцев назад +1

      When i started to mess around with Proxmox, i used to install a lot of stuff directly to Proxmox HOST. And one day Proxmox stopped working. Was it because i installed other stuff on the HOST or something else ... don't know. Now i follow a rule - do not install anything on Proxmox HOST unless o have no other option.
      For example Zabbix - i had to install Zabbix agent on Proxmox host to monitor each node, for Tailscale - there is no extra benefits to have tailscale inside proxmox host compared to LXC.

  • @rezenclowd3
    @rezenclowd3 2 месяца назад

    Why are you doing a static IP in the dhcp pool? Your DHCP server now may assign the same IP to another computer.... Instead do a DHCP static mapping on your DHCP server and apply your MAC address, or do a static IP in the LXC outside of your DHCP server pool range. IE 192.168.1.1/24 is your LAN. Setup your DHCP pool to be 192.168.1.100-254. That way you have ~99 IPs to use for static IPs depending on where your Gateway is (could be 1.1, could be 1.254 or anywhere in between)

    • @MRPtech
      @MRPtech  2 месяца назад

      Yes, you can do that.
      I set static IP in LXC config as it is much easier and same for everyone. I can't explain each and every router configurations and how to complete them.
      Plus - tailscale LXC container is my gateway to home network from outside and it is always running and Proxmox HA setup done. Maximum downtime 5 - 10 min.
      DHCP server will release IP to another device if Tailscale LXC container will end up offline for 15 days.

  • @mihleo6391
    @mihleo6391 Год назад +1

    Why dont you just use wireguard?

    • @MRPtech
      @MRPtech  Год назад +5

      1. With Wireguard for some reason i get slower speed connecting to server from outside home network. With tailscale i get close to full speed
      2. Tailscale is based on wireguard so technically i am using wireguard.

  • @CcnaLife
    @CcnaLife 6 месяцев назад

    good video but you didn't sht up for 1 second thruout the video... wish you took short breaks

    • @MRPtech
      @MRPtech  6 месяцев назад +1

      Agree. This one was more like speedrun

  • @petermarin
    @petermarin Год назад

    why did you uncomment the permit root access part?

    • @MRPtech
      @MRPtech  Год назад

      Because i want to give SSH access to ROOT user.
      If i leave that commented, root user can't connect via SSH, only normal users will.
      This is not recommenced. If someone will guess root password and gain access via SSH, they will have access to entire system.
      I done it just out of convenience and not necessity

    • @petermarin
      @petermarin Год назад

      @@MRPtech I appreciate the reply!! Can you show us the alternative that’s more secure? (New to this)

    • @MRPtech
      @MRPtech  Год назад

      Instead of using root you can login with normal user. If you don't have a user created:
      first - login as user and type adduser
      Finish setting this up, next you need to add user to SUDO group, command: usermod -aG sudo
      On next fresh USER login SUDO will be activated.
      Now you can SSH with user instead of ROOT.
      Suggestion - create SSH keys for better security.

  • @BeNtOoOoOo
    @BeNtOoOoOo 3 месяца назад

    Why not just run Wireguard without tailscale, i don't get why would people add an extra layer when wireguard works wonders.

    • @MRPtech
      @MRPtech  3 месяца назад

      wireguard make connection and that is it
      Tailscale add sooooo much moooore to just making a connection.

    • @BeNtOoOoOo
      @BeNtOoOoOo 3 месяца назад

      @@MRPtech it doesn't make a "connection" it makes a tunnel and a virtual network between the server and one or several clients. It also can route traffic from and to the LAN. So i really don't get what else tailscale can do...

    • @BeNtOoOoOo
      @BeNtOoOoOo 3 месяца назад

      @@MRPtech also, wireguard is 100% private, yours, non internet or outside dependant. Everything i need to my wireguard to work is my own wireguard server... Nothing else. Is it ease of use? I can't see other reason really.

    • @MRPtech
      @MRPtech  3 месяца назад

      Can wireguard:
      a) allow me to connect to wireguard nodes via SSH using browser?
      b) allow me to expose service to a public via tunnel?
      c) give me split DNS feature?
      d) provide me with custome domain? for example ibis-galaxy.net ?
      e) provide me an easy way to setup ASL rules?

    • @BeNtOoOoOo
      @BeNtOoOoOo 3 месяца назад

      @@MRPtech
      I don't think you understand how it works really... Wireguard it's a VPN, same as tailgate.
      ASL rules, split DNS and all you mentioned are handled by the server at your home.
      It just routes traffic to the tunnel, what you do with that traffic is up tou you...
      You want to split DNS? Then you just have to config it as such... You can do anything you want as if the client was in LAN, that's the point.
      You basicaly deal with wireguard trafic as you would deal with a VLAN.
      So yes... You can do all that and more, depends on your setup.

  • @petermarin
    @petermarin 2 месяца назад

    Do you still needs that change in the proxmox configuration if you’re doing this into a VM?

    • @MRPtech
      @MRPtech  2 месяца назад

      No. With VM you don't need to do that.