There is no access from the lan to the tailscale network due to userspace mode being used however, the socks proxy could be enabled to gain access from the lan into the tailnet. Two env variables are required, $args and the $authkey.įor args I use -accept-dns=false -accept-routes=false -advertise-exit-node -advertise-routes=172.17.0.0/16 The file needs to be copied into the official container and pushed to a repo or exported as a tar file for used on Mikrotik FROM ghcr.io/tailscale/tailscale:unstable Tailscale -socket=/tmp/tailscaled.sock up $args -authkey=$authkey Firms give router admin access in this address to allow network administrators to configure their routers and networks. Tailscaled -tun=userspace-networking -socket=/tmp/tailscaled.sock &> /dev/null & Click your router from the List: MIKROTIK Router Admin Passwords and Login IP MIKROTIK is a Router like Linksys, TP-Link and others manufacturers use as an access point or gateway. Figured I’d also share what I came up with: ![]() With that container, all you need is an entrypoint file. ![]() I had previously used tailscale on kubernetes (fantastic by the way) and therefore used the official container instead of building from source. Didn’t have to build my own if I would have looked here first Too late.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |