How to Set Up a Site-to-Site VPN with Tailscale | Secure and Simplified Networking

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 19

  • @davidr8424
    @davidr8424 25 дней назад

    Wow, amazing presentation of your videos, I've subscribed.

  • @NathanielWyatt
    @NathanielWyatt 3 месяца назад

    THANK YOU SO MUCH FOR THIS!!! What an amazing tutorial man!

    • @LinuxCloudHacks
      @LinuxCloudHacks  3 месяца назад +1

      Glad it helped! Stay tuned for more tech tutorials!

  • @micky1067
    @micky1067 3 месяца назад

    Hello.. great turotial again. What do you think is a better way ? Headscale or zerotier ?

    • @LinuxCloudHacks
      @LinuxCloudHacks  3 месяца назад +4

      Oh boy. Tough question. I'm afraid I won't be able to answer :) Headscale is a fantastic project. However it requires you to expose your self hosted control server to the Internet, so you either need a static public IP and preferably a domain name, etc. or you need to expose it via Cloudflare tunnel (so you still need a domain name). Moreover Headscale does not have a GUI (none of the ones I've tried work reliably), so you have to add your clients from CLI. So all the beauty of Tailscale (adding clients in just few clicks) is yet not there.
      ZeroTier has a GUI, does support Layer2 bridging as well as it has builtin support for Mikrotik routers but unfortunately it's not based on WireGuard.
      It all depends on the use case. If you just want to connect from a laptop to your home lab and you have a public IP or if you want to do site to site connection (having at least 1 public IP) then plain wireguard would be my choice (especially as Mikrotik, Unifi, etc. have built-in support for WireGuard). If however you need a dynamic mesh VPN and you don't want to self host it then I would look at Tailscale or ZeroTier. Both great options. If you need a mesh VPN and you want to self host it then ZeroTier is easier to setup. Headscale - fantastic project but requires more steps to set it up (and does not have a GUI).
      Not sure if my reply is any help. I'll definitely make a video on headscale (maybe we'll integrate it with Google or Azure for authentication and see how it behaves).

    • @micky1067
      @micky1067 3 месяца назад

      @@LinuxCloudHacks so great answer. Thank you so much.

  • @naitcalo2141
    @naitcalo2141 3 месяца назад

    Hi, great video very helpful but I have a question which you don't mention in the video, the ip route add command does not persist after reboot, what would be a solution for this? thanks

    • @LinuxCloudHacks
      @LinuxCloudHacks  3 месяца назад +1

      Thanks! Glad you liked it!
      To your question - it all depends on the kind of tool/service you use to manage your network configuration. If you are using:
      - Netplan - you just add below section to your /etc/netplan/.yml configuration file
      routes:
      - to: 10.1.0.0/24
      via: 192.168.1.1
      And then execute "netplan try"
      - "ifupdown" - you just add below to your /etc/network/interfaces
      up ip route add 10.1.0.0/24 via 192.168.1.1
      systemctl restart networking
      - "Network Manager"
      nmcli connection show
      nmcli connection modify eth0 +ipv4.routes "10.1.0.0/24 192.168.1.1"
      nmcli connection down eth0
      nmcli connection up eth0
      - "SystemD-NetworkD" add below to your conf file /etc/systemd/network/eth0.network
      [Route]
      Destination=10.1.00.0/24
      Gateway=192.168.1.1
      systemctl restart systemd-networkd
      This if from the top of my head so it might not work right away :)
      Maybe I'll create a video comparing various networking configuration tools for Linux. Would that help?

  • @marcelsegundo8875
    @marcelsegundo8875 2 месяца назад

    Do you think that it works for connect GCP and AWS, like a "tunel"? I want to connect ArgoCD that is in a cluster in a AWS environment to a GCP cluster

    • @LinuxCloudHacks
      @LinuxCloudHacks  2 месяца назад

      Hi! Can you elaborate more on what would you like to achieve? You want to have reachability between two k8s clusters via tunnel?

  • @dariofacchini851
    @dariofacchini851 Месяц назад

    I obtained reachability but for some reason I cannot reach web addresses within the other network.
    For example, accessing the remote router interface via 192.168.1.1 simply gets no response, even though I can ping such address. Any suggestions?

    • @LinuxCloudHacks
      @LinuxCloudHacks  Месяц назад

      Hi,
      Are you saying that you can ping between two nodes on the private networks but if you try establishing tcp connection on port 80/443 etc. you get a timeout?

    • @dariofacchini851
      @dariofacchini851 Месяц назад

      @@LinuxCloudHacks My setup is basically a mac accessing the remote local network. I can ping addresses in such network, and they do go through the right tun interface. However, yes I get a timeout when accessing (for example) the router interface. How can I check what route my pings are going through from my Mac?

    • @LinuxCloudHacks
      @LinuxCloudHacks  Месяц назад

      @@dariofacchini851 Just do "route get 8.8.8.8" if you want to check how you go to 8.8.8.8 etc. It will show you the gateway and the interface.
      BTW
      1. Do you have reachability over those 100.x.x.x.x IPs?
      2. On the remote network router you did "tailscale up --advertise-routes= --snat-subnet-routes=false --accept-routes" ? And then you accepted the routes in tailscale console?
      3. Is the remote router a default gateway for nodes in the private network? If not then you need to set snat-subnet-routes to true.
      4. Do you have any firewall setup on the remote router? (Maybe it's blocking traffic)
      5. What does traceroute tells you?

  • @raul230285
    @raul230285 10 дней назад

    headscale please video

  • @AdrianuX1985
    @AdrianuX1985 3 месяца назад

    +