The Homelab Show Episode 64: Tailscale and Headscale

  Рет қаралды 10,103

Lawrence Systems

Lawrence Systems

Күн бұрын

Пікірлер: 16
@bikerchrisukk
@bikerchrisukk 2 жыл бұрын
Really appreciate this, I've just managed to get TailScale working, thanks for motivating me!
@CilusseYT
@CilusseYT 2 жыл бұрын
Been using Tailscale for years, it’s awesome
@stevdodd7515
@stevdodd7515 2 жыл бұрын
worth watching. Feel like a finished book
@Mikesco3
@Mikesco3 2 жыл бұрын
I so appreciate the extended conversation about this. I am relying on Zerotier quite a bit. It would have been nice to hear about how would tailscale would be different with Zerotier.
@itsmith32
@itsmith32 Жыл бұрын
Tried ZT little bit, but in basic config my phone loses connection via tunnel even when I'm jumping from cell to WiFi
@Muaahaa
@Muaahaa Жыл бұрын
What are the best practices for securing a headscale server on a public IP? Running outside of home lab? Port forward from router? Reverse proxy running outside of lab? Something else?
@LAWRENCESYSTEMS
@LAWRENCESYSTEMS Жыл бұрын
I guess you could lock it down to only allow the IP addresses you will be coming from.
@camaycama7479
@camaycama7479 2 жыл бұрын
Very hard to find tuto about the Headscale part. The git page isnt super clear to me.
@LAWRENCESYSTEMS
@LAWRENCESYSTEMS 2 жыл бұрын
kzbin.info/www/bejne/Y2rKiYNslsaUr9k
@alphakamp
@alphakamp 2 жыл бұрын
what about netmaker?
@LAWRENCESYSTEMS
@LAWRENCESYSTEMS 2 жыл бұрын
¯\_(ツ)_/¯ have not had time to test it.
@mathewmickle3116
@mathewmickle3116 2 жыл бұрын
Can you do headscale on a raspberry pie?
@LAWRENCESYSTEMS
@LAWRENCESYSTEMS 2 жыл бұрын
They do have an ARM version, but you would still need to make sure it has access via a public IP
@pepeshopping
@pepeshopping 2 жыл бұрын
Secure networks do not allow RANDOM UDP or TCP ports in or out. Period. Yes, adds inconvenience when somebody “decides” to start using a new service or application, but if you don’t have control of your network, somebody else will! Trojans/spyware usually use non standard ports when trying to connect or send data to their command and control server.
@LAWRENCESYSTEMS
@LAWRENCESYSTEMS 2 жыл бұрын
The old malware used to use random ports, now modern C&C servers use 443 and Let's Encrypt Certs to better obfuscate the traffic.
@TechySpeaking
@TechySpeaking 2 жыл бұрын
First
The Homelab Show Episode 63: Troubleshooting Tips & Tools
55:29
Lawrence Systems
Рет қаралды 4,7 М.
How Tailscale Makes Managing Wireguard Easy
27:53
Lawrence Systems
Рет қаралды 84 М.
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 120 МЛН
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
Tailscale Webinar - NAT Traversal explained with Lee Briggs
1:12:07
Self Host Tailscale with Headscale - How To Setup
21:51
Jim's Garage
Рет қаралды 84 М.
Ask a Tailscale Engineer: What is Tailscale Funnel?
9:50
Tailscale
Рет қаралды 6 М.
100 Days of HomeLab
13:03
Techno Tim
Рет қаралды 44 М.
Which Self-Hosted Dashboard is Right For You??
14:56
Raid Owl
Рет қаралды 129 М.
Build Your Own VPN with Headscale & Tailscale
37:06
Jim's Garage
Рет қаралды 42 М.
A Tailscale Package for pfSense!
30:18
Christian McDonald
Рет қаралды 43 М.
How to Setup The Tailscale VPN and Routing on pfsense
17:10
Lawrence Systems
Рет қаралды 93 М.
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 120 МЛН