Loading...
Loading...
#tailscale is super easy to set up, and create a private network. Access media servers anywhere, have friends and family be able to access the devices remotely. It's a great addition to your #homelab and I mentioned it was easy yes?
Performance Category
Above Average
Score
4.7/5
Shares: 5/5
Comments: 5/5
Retention: 5/5
Views: 5/5
Likes: 5/5
Followers: 5/5
Script: 3.0/5
Total Views
53475
Likes
2139
Shares
135
Comments
152
Duration
3m 29s
For You
44,652
83.5% of views
Search
5,775
10.8% of views
Personal Profile
2,086
3.9% of views
Others
909
1.7% of views
Follow
53
0.1% of views
Sound
0
0.0% of views
Views
Likes
Shares
Comments
For You Traffic
Profile Traffic
Search Traffic
Non-Followers
88.0%
47,058 views
Followers
12.0%
6,417 views
22.7% of followers reached
New Followers
363
Performance vs Median
No transcript available.
No scorecard available.
Run the script scorecard evaluation to generate insights.
Run the AI evaluation to identify actions and analyze their impact.
No tips available.
Run the script scorecard evaluation to generate actionable tips.
ximi das🇦🇺🇬🇧🇨🇦🇪🇬I think from your explanation it looks like zerotier
JonHighly recommended ZeroTier
wuhawkI need help with this for my plex I couldn’t figure it out
As long as the device running Plex and your device are on the same tailnet. You just use the https://TailNetIP:PlexPort and you can connect
wuhawkK yeah so I have my pc connected and other device connected to it… but under the services where shows the services nothing shows up … and I’m confused if I have to input ip port or link to plex itself like I do with Nord meshnet
wuhawkCause plex by default runs port 34000 but I cannot for the life of me get plex to remote
wuhawkNordVPN was so quick easy but they discontinuing meshnet come December I had ZeroTier working but it’s Uber slow and disconnects alottt
wuhawkSo I’ll try this but does this mean it’s only browser accessible ? Or can load from plex app and tailscale running in background for say a firestick
wuhawkSorry for lot of comments but do I have to set plex settings and remote on or just input the tailscale ip kinda like Nord meshnet
You don't need to do anything to plex at all, Tailscale is going to be setting up a network between all devices so all the apps will connect.
Browser access is the only way yeah, if you're using free Plex, and Tailscale. BUT I haven't tried it with their Tunnels though.
Try using Cloudflare tunnels, that is another option that will work.
wuhawkYeah so with Nord meshnet you’d input the Nord mesh ip port or the link they provide in a section to the plex server don’t need remote just the meshnet tunnel so if meshnet is on and connected and base pc has server on you’d just open plex app and it just connects through the tunnel
wuhawkTrying to mimic a seamless plex connection through the app by using tailscale as a tunnel so for tvs I can connect tailscale open plex and boom
wuhawkI heard tail scales tos don’t like streaming and it would be used daily practically and I’m worried about speed and privacy by using their servers vs something like nords no log
You don’t need to do anything inside Plex for Tailscale. Plex will just see your other devices as if they’re on the same local network once Tailscale is active on both ends. What’s probably breaking it for you is that Plex still tries to use its own “Remote Access” relay instead of the LAN route. You can ignore Plex’s remote access settings completely — don’t enable them, don’t port forward anything. Here’s what to do: 1. Install Tailscale on your Plex server and every device you want to stream from. 2. Make sure they’re all logged into the same Tailscale account. 3. On your phone or Firestick, open Plex after Tailscale is connected — Plex should see the server instantly through its local IP (the 100.x.x.x address). You don’t have to set exit nodes or subnet routes for this. It’s direct peer-to-peer traffic, so it’s faster than routing through Tailscale’s relays. If it still shows “offline,” try going to the Plex web app on your server, open “Settings → Remote Access,” and turn Remote Access off — that stops it from fighting the Tailscale connection. Nord Meshnet worked because it did the same thing automatically. Tailscale can do exactly that once Plex stops trying to use the relay.
wuhawkYeah ima try again tonight I did try with remote off as well was enable private relay off it just won’t load which is why I mentioned the artical talking about using cellular to connect to tailscale lan network
Liam MerickYeah, Tailscale is super slick for private networks and i also love how I can grab media from my server no matter where I am. I’ve been pairing stuff like this with WorkBeaver too though, so I can actually automate routine server tasks, like backups or file organization, without having to log in every time. Makes remote access not just easy, but lowkey hands-free lol
I've not heard of Workbeaver, but ill take a look!
Just Build SomethingI've just been accessing my stuff over wireguard. is that fine or would tailscale somehow be more or less secure?
Honestly if you have wineguard set up and it works for you, then there is no reason to change to be honest.
Liztailscale is built on wireguard afaik. tailscale is just *really* easy to setup
RamaPRIVATE IN THE CLOUD ??!!!!
Kinda.
ShamalananDo you have a video on creating your visual flows in draw.io
No but I can
HoldMyBeerAgainreverse proxy and cnames. plex.domain.com, overseer.domain.com, etc. single exposed port, 443, forwarded to nginx proxy manager which also handles ssl certs and if desired authentication.
If you'r enot behind a CGNAT it works great.
cheesyfingersI'm so glad CGNAT is not really a thing in my country.
Lucky! It's such a pain.
startingframeI am just starting out and using truenas scale currently. I am installing this today
It's totally worth it
FuZzYSainT13So if my raspberry pi with pihole is my exit node, and i connect tail on my phone, my traffic will route through my pihole out to the Internet if i understand correctly?
Nemumeter100 free devices ? What the sacrifices ?
m1ndsurferthat's when I was out at tailscale, when there was account creation.
If yiu don't create an account, your not able to administer your machines, so it's not very secure.
warialex69thanks
qwertytailscale forces you to trust a 3d party that can at any time walk into your networks.. just setup wireguard mesh yourself
Yeah, or headscale is an option as well.
Yuhyuhyongno, they don't have access to private keys. those are on the devices. they just faciliate public keys
DarthMenacehmm tailscale vs twin gate which is better
Great question, I'll investigate!
j0hn.rees3why this over cloudflare?
Cloudflare is great at DNS, and you can use it to direct access on tunnels, but its open to the public that way and this is about more closed options
ohasoyIs it better than Fortigate ?
Im not sure, Im considering getting a fortigate applicance so I may have an answer for that later.
ArthurTailscale was the first company to voluntarily comply with Russia’s censorship laws. Pass for me.
XarvarsWith some exceptions literary every western company is in Russia and compling to theyr laws
lykirīomg chill
warpcodewhat I'm curious of is that I already have pihole running as my primary local DNS, I'm using traefik in docker to map domain names to my services. how would I link this up with tail scale? all my pihole local DNS records use 192.* ips to map to service.domain.com (templated, I have an actual domain).
Install Tailscale on both Pi-hole and your Traefik host, then point your Pi-hole DNS records (e.g. service.domain.com) to each host’s 100.x Tailscale IP. In the Tailscale admin, set Split DNS for domain.com to use Pi-hole’s Tailscale IP as the resolver. This way, whenever you’re on Tailscale your custom domains resolve to 100.x addresses and Traefik routes the traffic normally. I think this will work
DevCan you make a video on spinning up your personal server with a static IP without NAS and all these other applications... Like setting up from scratch with your own configuration, network, security, storage and all? 🤔
AzeroI stopped listening at "create an account "
Kusevac HrvatskaOne word. PANGOLIN! 🥰
Kusevac Hrvatskaor netbird if you need full network access for any reason..
Kim YongNot secure as traditional VPN, although does the job
oliv_r 🍉jellyfin tailscale in my nas makes watching via infuse in my ipad so worth it. it cant block my goon material and tv show in the office anymore!!!
tracer.vgwait proxmox has an appstore ?
Oh, no sorry I misspoke.
YoanBeen using it every day since 2021, absolute love it!
AdamI use a vpn some times, but I don’t understand what tailscale does? Can you explain like I’m 5? :)
Tailscale creates a network of many computers like they were all at the same house. A VPN let's you access internet as if you're in another location.
HiếuTailscale init outbound connection from your device to their server to bypass firewall, nat. Also encrypt your data because it's built on top of Wireguard.
Trackpro_I too LOVE Tailscale
Maik Mueller ᵃʳᵗtailscale is the best
It is.
senorheziNow this is my favorite channel
TaylorI have a GL-iNet Flint 3 router with tailscale installed, and it allows me to do lan gaming without having to forward ports. it's also nice to be able to access my entire home network and devices from anywhere
Nice, I haven't seen many routers with native tailscale support
Tasman Skies 🥝Tailscale’s free personal plan is limited to 3 users. Are you saying that 99% of us are lonely incels that can’t possibly have a partner and two+ children? (I hate Tailscale’s pricing plan. What qualifies as a ‘user’? A actual person, or an identity on a system?)
I assume a user is a identy, you can share passwords. Or just connect all the devices and log in on the same user and it's going to work.
jjjjjjasonnnnnnAny advantage of Tailscale over WireGuard? I already have WG set up.
Not that I know of, it's all about what works for you
Bumbleknackhow do they fair with a CGNAT network?
No issue at all, it's the reason I use it
𝓡𝓲𝓬𝓴 🇳🇱Tailscale is very usefull, i use it so i do not have to portforward my devices
GillesHow safe is the unify teleport vpn to my edge router (unify cloud gateway ultra)
I've not had a lot of experience with unifi sorry
FrizIf you have one commercial vpn connection on an instance at home, can Tailscale be set up to route all traffic through that even from outside your home?
You could set that device that is on the vpn, as the exit node for your second device and that should work.
Frizwas thinking something like that, but can i force my laptop/phone to take the roundabout way or will it only turn there for local routing.
MasterH 2005I love using Tailscale! I have it running on my Raspberry Pi5, and it also allows me to connect to my CasaOS server.
theoneajwLove Tailscale for my network but use proton for travel so no exit node needed.
A solid alternative, I prefer mullvad, so it works for mw
/home/thankarezoswhy not just setting up a wireguard server?
Can, this is just a simple alternative
/home/thankarezosis it simpler tho? in my experience wg can be set up in 5 minutes with docker compose and it automatically creates the peers and the only thing you need to set is the domain (if not just use your static ip). openvpn is way harder. also there is wg-easy that does it way easier. tailscale sounds so much more complex and I dont think it makes sense if you already have a homelab meaning that spinning a container or vm is very easy
Well, docker compose and done, no domain. Also apps on all other devices are one click install. May not be simpler, but it's a simple alternative.
/home/thankarezosfair enough, you can also show the wireguard installation method in another video. I believe many people will like it. especially the privacy focused people
/home/thankarezosalso wireguard don't need any apps. it just sits on the network
Good idea, I'll do that!
Nobodythats not possible for some providers where I live. u can't get a public ip even if you're willing to pay for public. so solutions like tailscale or zerotier are one way
/home/thankarezosswitch isp then. sounds like a scammy provider. if you pay for static ip they have to give you public ip cause else its not static cause the whole point of static ip is so people can reach you
Not necessarily.
Nobodynot worth it. more money for something I m able to do using tailscale
/home/thankarezosi would change provider. also cgnat is bad anyway cause you might blocked for someone else actions (it happened to me once where Ubisoft was blocking my ip) and most providers will be fine to opt you out anyway. also tailscale has speed and network latency cause you connect to their severs. wireguard is direct access to your network with limiting only your upload speed. i connect via wireguard and if the external network is 1gbps i have almost 1gbps connection. so its not simple "just better less expensive" and again if isp doesn't allow me to opt out of cgnat they are trash provider cause thats only 1% of their users actually needing not yo be on a cgnat so they are not running out of ipv4s if they also have most users in cgnat. in my country i am protected from being forced on cgnat. with law i can ask to opt out and also i am allowed to put my own hardware and they have to enable bridge mode
necromancerdepends really thise behind a cgnat cant
PigJohntailscale is amazing shame you can't integrate your own mullvad VPN into it - well you kinda can with a vps but effort
You can! Tomorrow I'll show you how!
PigJohnyeah run the client on your server then set that server as an exit node?
Nope, you can set any of the mullvad vpns as the exit
PigJohnbut you have to pay them? can't use your own?
Oh, well yes you need to pay them, so I guess you can't use your own, if you've already paid for time.
PigJohnhaha yeah 🤣 so I use the exit node way instead. got a few months left with mullvad 😅
canadiansirup999if its free than am the product? 🧐
Nope, it's free to get you to use it and then use paid add-ons of yiu want things like vpns and so on.
Unsolicited opinion giverbeen using tailscale for 2 years for my media server. works surprisingly well with resilio sync
Tailscale is awesome.
ุthese are all ways you can open backdoors into your network unless you're self hosting remembering not your keys. not your kingdom
Headscale is a self hosted alternative, a little more complexity here, but worth the effort.
I don't know man...my solution was to use wiergurd as vpn playit.gg for tunnel very strict firewall rules so only wiergurd can go outside network
Solid
LankyHow about accessing plex on a remote tv when my isp uses cgnat
If you can get the tv on tailscale then no issue. It's not a perfect solution though
LankyAny options you know with any other tools? Thanks!
If you get a VPN, then a static ip on that service. Add your plex server to the vpn, and CGNAT isn't an issue. But difficulty level is moderate/high
ChickenDipps | Lily ☭look into cloud flare tunnels
HiếuHeadscale or Pangolin. Free service like this may not meet your bandwidth requirements
CanucksI like tailscale too, wireguard and openvpn are nice too. If I didn’t need to route all my traffic through my home network when I’m away from home, I’d probably be using tailscale
Even great tools have limits!
CanucksThey sure do! I like your content btw. Keep it up 😁
RiBirdoyou can setup a device to be an End Node
JamesRokasyou can use tailscale for that as well
CanucksHmm I’ll have to look more into this. Thanks! FWIW I’m using a opnsense router with a wireguard server set up and that seems to be good enough, and I’m not actually sure if opnsense has an tailscale option. I’ll check it out over the weekend!
BirbGuntailscale is locked into using their infrastructure(the company). To avoid portforwarding, you piggyback off their datacenters to connect all your devices. It also won't act as a true VPN without designating an end node or endpoint (whichever they label it). Something like wireguard will function better for full usage.
CanucksThanks birb, what you brought up prompted me to look into it as well, so there’s two paths with tailscale that I understand, all connections are established via tailscale infra, but there’s two outcomes, if the connection doesn’t require NAT, it can route the connection P2P, otherwise tailscale falls back to their relay server, acting like a tunnel, they call it DERP. This would significantly reduce throughput/bandwidth, and it’d be useless to be used as a vpn (routing it to the edge node). Does that sound right? Wireguard seems to seem like the most simplest and applicable choice for someone that just needs a vpn server to route their traffic back to their home WAN without and bottlenecking.
MF Studio | TechYour videos are awesome
Thanks! I'm really enjoying making these and loving the fact that people like them!
Total viewers and likes aligned with spoken words.