Tailscale 的工作原理 https://tailscale.com/blog/how-tailscale-works/ NAT 遍歷的工作原理 https://tailscale.com/blog/how-nat-traversal-works/ Tailscale VS Zerotier https://youtu。 be/lAhD2JDVG08 如何在雲中構建自己的 Wireguard VPN 伺服器 https://youtu.be/7yC-gJtl9mQ Nebula Review https://youtu.be/94KYUhUI1G0 ZeroTier Review https://youtu.be/Bl_Vau8wtgc 入門開源和免費圖表工具 Diagrams.NET https://youtu.be/P3ieXjI7ZSk Headscale:Tailscale 協調伺服器的開源、自託管實現。 https://github.com/juanfont/headscale 與我們聯繫 ——————— ————— + 僱用我們進行項目:https://lawrencesystems.com/hire-us/ + Tom Twitter 🐦 https://twitter.com/TomLawrenceTech + 我們的網站網站 https://www.lawrencesystems.com/ + 我們的論壇 https://forums.lawrencesystems.com/ + Instagram https://www.instagram.com/lawrencesystems/ + Facebook https://www.facebook.com/ Lawrencesystems/ + GitHub https://github.com/lawrencesystems/ + Discord https://discord.gg/ZwTz3Mh Lawrence Systems 襯衫和贓物 ——————– ——————————- ►👕 https://teespring.com/stores/lawrence-technology-services推薦鏈接———————————————— — Amazon Affiliate Store 🛒 https://www.amazon.com/shop/lawrencesystemspcpickup 我們所有的附屬公司都可以幫助我們並可以為您提供折扣! 🛒 https://www.lawrencesystems.com/partners-and-affiliates/ 我們在 Kit 上使用的裝備🛒 https://kit.com/lawrencesystems 免費試用 ITProTV 並獲得 30% 的折扣! 🛒 https://go.itpro.tv/lts 使用 OfferCode LTSERVICES 在 🛒 https://www.techsupplydirect.com/ 數字海洋優惠代碼 🛒 https://m.do.co/c 上獲得 10% 的折扣/85de8d181725 HostiFi UniFi 雲託管服務🛒 https://hostifi.net/?via=lawrencesystems 使用 VPN 保護您的隱私免受私人互聯網訪問 🛒 https://www.privateinternetaccess.com/pages/buy-vpn/LRNSYS Patreon 💰 https://www.patreon.com/lawrencesystems ⏱️ 時間戳⏱️ 00:00 Tailscale 審查 01:49 Tailscale 的工作原理 04:52 Tailscale 定價 05:25 身份管理 06:34 支持的客戶端 07:21 儀錶板 10:00 Tailscale 實驗室測試20:15 最後的想法和安全#Tailscale #Wireguard。
Tailscale 如何讓管理 Wireguard 變得簡單
24 comments
Comments are closed.
How Tailscale Works
https://tailscale.com/blog/how-tailscale-works/
How NAT traversal works
https://tailscale.com/blog/how-nat-traversal-works/
Tailscale VS Zerotier
https://youtu.be/lAhD2JDVG08
How To Build Your Own Wireguard VPN Server in The Cloud
https://youtu.be/7yC-gJtl9mQ
Nebula Review
https://youtu.be/94KYUhUI1G0
ZeroTier Review
https://youtu.be/Bl_Vau8wtgc
Getting Started With The Open Source & Free Diagram tool Diagrams.NET
https://youtu.be/P3ieXjI7ZSk
Headscale:An open source, self-hosted implementation of the Tailscale coordination server.
https://github.com/juanfont/headscale
⏱ Timestamps ⏱
00:00 Tailscale Review
01:49 How Tailscale Works
04:52 Tailscale Pricing
05:25 Identity Management
06:34 Supported Clients
07:21 Dashboard
10:00 Tailscale Lab Test
20:15 Final Thoughts and Security
I think you should consider also uploading your content on LBRY
I started trying with Tailscale in the home before going over to ZeroTier. One persistent challenge I had trying Tailscale was on some (but not all) Windows clients the login feature would simply not work. With ZeroTier the ability to directly enter "Join Network" with the network ID on the GUI was great and worked. I wish I new of ZeroTier (and this channel !!!) earlier.
What about Netmaker?
I signed up for the personal pro plan after watching your videos. $48 a year for 100 clients is cheap enough that I'm not going to bother rolling my own. The best part of it is how easy it handles DNS. I have a pihole VM running and you can install tailscale on it and set it as the nameserver for all the tailscale clients. Combine this with a subnet relay into my LAN and I can reach every device by name without worrying about split DNS.
Just small note – NAT is not a firewall! You mentioned this couple of times during the video.
I've been using tailscale for about a year now after I wanted to access my pi server through CGNAT. Its simplicity and transparency have pretty much won me over.
I』m struggling to understand how this is different than ZeroTier…
Does Tails eliminates the need for the user to be admin in the machine in order to run the client?
Is it self-hostable on a VPS or a droplet? No? If you can leave Wireguard behind, there's Nebula.
The transfer rates stop at 300 because Tailscale uses the user space WG Go implementation, NOT the kernel space implementation that moves at gigabits per second. You should have checked the tail-scale source at github.
Also, it』s worth noting that the Go implementation does not use AVX, SSE, Vector accelerators like the kernel space implementation.
This is why I use Pfsense Wireguard package to bridge my devices. On the same 2670 you have, I max out my 10 gigabit network using wireguard internally because it』s the fast kernel space implementation with jumbo frames.
Another correction: you stated that Tailscale does not store any keys. They do store public keys. Still secure as just pub keys can』t compromise things but just thought to let you know.
Are the slower speeds because it's a Free account ?
There was a video that you mention closing your business and go for YouTube only. Please don』t do that. What makes this channel one of the unique ones is you being in the actual battle field. Your thoughts matter because you are not just a random guy who is reading some tutorial and showing those on VM environment. Continue you business please. And if you quit who is going to insult the networks. 🙂
This is really cool. Now I can LAN Party CS:GO with my friends sitting in a different city 😄. Free Account is more than enough to cover 10 System 😋
Thanks for making a video on this!
They just launched an official Synology package that is available in the package center. It seems like a nice way to access a Synology NAS without using Synology QuickConnect. I am guessing it is at least as secure as QuickConnect and probably faster.
Hi Lawrence, thanx for this video, i'm wondering, if you have some info on open source SDWAN project ?
I switched to zerotier from hamachi a while back because it was easier, better supported, and had a much friendlier speed cap. Now i mostly use a manual wireguard server but this still looks very interesting.
Great demo for a business user, what about the average Joe who just wants VPN back to their home LAN through laptops, phones and tablets.
「Oh I don』t know, check the documentation」, but you do RECOMMEND IT eh?
Hey Tom, thanks again for awesome tutorial, please do an updated complete version of WireGuard when you get a chance sir,
Regards Shane from Trinidad 🇹🇹
Not all Heros wear capes, thanks again Lawrence Systems!
Awesome tutorial. I used your guide to setup pfSense a while back and it worked without a hitch.
I'm planning on setting up a Terminal Server for a club a school and was wondering on the best solution for setting up VPN for just access to that server and nothing else on the network. And that terminal server shouldn't have access to other network interfaces and so on.
Will Tailscale help with this or is there another guide that can help me go through with this?
How does tailscale compare with openVPN for a small number of servers?