Tailscale: Difference between revisions
No edit summary |
|||
| (6 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
Tailscale is an | Tailscale is an local mesh VPN which sets up direction connections between devices in your Tailscale network. Under the hood, it uses its own userspace wireguard implementation along with NAT traversal. In the event devices cannot connect directly, traffic passes through it's DERP relay servers. | ||
==Exit Node== | ==Exit Node== | ||
| Line 16: | Line 16: | ||
tailscale ping $HOST | tailscale ping $HOST | ||
</syntaxhighlight> | </syntaxhighlight> | ||
==Split DNS== | |||
Tailscale allows you to overwrite the DNS on each client and supports split DNS.<br> | |||
You can combine this with a custom dns resolver (e.g. nextdns) to rewrite certain DNS entries when Tailscale is connected.<br> | |||
One idea could be to let Cloudflare proxy all your websites to get CDN, DDOS protection, etc. But clients with Tailscale can directly connect with your webserver.<br> | |||
* Note that one issue with this is that applications and OSs tend to cache DNS results so switching Tailscale on and off can be an issue. | |||
* If you only need access when Tailscale is connected, you can just stick the Tailscale IP as a public DNS entry. | |||