Is it possible to add routes that aren't present in the gl.inet router? I have the router behind main firewall with several networks, and they aren't visible in the Tailscale dashboard.
Another question: the Gl.inet & Tailscale documentation states Note: GL.iNet router is not yet available as an exit node. Is there a date for this implementation?
There is no this feature develop plan for the time being.
You can try the GL feature AstroWarp.
Only the WAN subnet can be recognized. The subnet that is not on the router's interface may not be recognized by Tailscale, and it seems that the subnet cannot be added manually.
Ops! No development plan, but only halfway integrated? I don't understand why.
Well, I'm trying out different solutions, since Tailscale seems interesting when the network the travel router will connect to may be limited (many networks block VPN services), and it could have some more options through the CLI. Curiously, I've been able to install Tailscale on Apple TV; it allows you to add networks and also act as an Exit Node.
I've checked AstroWarp, and I don't see it as a solution for me. Masked communications and forced to work with fictitious IPs assigned by the AstroWarp Cloud.
I don't want masked communications. I usually work with VPNs and only mask traffic when absolutely necessary.
I wonder why there isn't such a simple solution to be able to establish a site-to-site VPN in a classic and simple way.
Yes. My main use is to connect via VPN to my home and create a full-tunnel. Without hiring public VPN services (Nord, etc...). So my overall configuration is very simple.
But, I was testing different scenarios to learn a little more about the capabilities of the equipment and other connection options in case OpenVPN or WireGuard were blocked somewhere.
From Tailscale to understood that the Tailscale is also built on WireGuard to create a virtual network.
You can try OpenVPN TAP to establish a layer 2 network (site to site). However, you still need to choose VPN or Application and to configure it according to your scenario.
You can set WireGuard server in any port you like, not necessarily the default one. I have a full tunnel VPN (only used for certain devices by MAC) on a gl brume 2, which I use as my main router too.
Full tunneling is possible via openVPN and WG out of the box, unless the issue is that you’re behind CG-NAT in which case either ZeroTier and Tailscale would work.
Have you tried setting up an exit note with ZeroTier?
Hi Chris,
Thanks for replying. I missed the ZeroTier option! :o
I was testing different solutions to account for possible scenarios. By default, simple WireGuard would be sufficient.
The server wouldn't be a problem because it's hosted at my house. It's in client mode that some sites block common VPN (or application) ports, so Tailscale seemed like a good idea as an alternative. But gl.inet doesn't support this as an exit node. I solved this when I discovered that an Apple TV (also hosted at my house) can be an exit node.
I'll try ZeroTier as well. I want to know the different options and keep them as simple as possible. When I'm traveling, I don't want to be troubleshooting (there are enough of those at work, haha).