Ā 
19
Votes

Tailscale support

Ā 
19
Votes

Tailscale support

17 Reply
RE:Tailscale support
2024-09-21 01:54:15
It would be nice!
#12
Options
RE:Tailscale support
2024-09-22 11:55:29 - last edited 2024-09-22 12:11:19

Would like to see this as well, for when OpenVPN isn't suitable etc.  Tailscale is in wider use at this point, especically for smaller instances, or when less-than-ideal network topoligy exists, so it would behove TP-link to support/integrate it.

#13
Options
RE:Tailscale support
2024-09-22 14:51:14
Great idea, it will help a lot to get walkaround for non public ip behind the ips CgNAT. There is possibility to do it with RPi or WM on PC, but if it was direct on the router it self i would be super useful! I hope TPLink will hear us. šŸ˜‰
#14
Options
Re:Tailscale support
2024-09-28 00:35:23

  @Clive_A 

 

This is a terrible response.

You can make all the same arguments about Omada. Free as well as paid, need to depend on someone else to host it, and GOD FORBID you tech support answer any questions. And you redirect to a post about Cloudflare Zero Trust Tunnel... also a paid, third-party hosted solution and completely unhelpful.

 

The comments in that thread nail it... the industry is moving in this direction and TPlink is moving to irrelevancy. It would be better to ignore your customers' requests than respond with barely veiled hostility that showcases your ignorance. You clearly do not understand the problems solved by these technologies or the technology itself. IPsec plays no role in Tailscale, Cloudflare ZTT, or Wireguard.

 

Please instead respond to a request like this with
"We do not trust that any of our customers have deep networking knowledge or the ability to perform research or read documentation. We do not want to have to support customers with a new technology. Instead we have chosen to use half-implemented legacy VPN technologies because we already have the unhelpful 'help' pages we can paste in response to a support request with minimal effort. It would be too helpful and not in line with our reputation to direct customers to Tailscale's vastly superior documentation"

 

For anyone interested, you can use Tailscale with Ubiquiti...

#15
Options
Re:Tailscale support
2024-09-29 02:04:01

Hi @briocheBrad 

briocheBrad wrote

  @Clive_A 

 

This is a terrible response.

You can make all the same arguments about Omada. Free as well as paid, need to depend on someone else to host it, and GOD FORBID you tech support answer any questions. And you redirect to a post about Cloudflare Zero Trust Tunnel... also a paid, third-party hosted solution and completely unhelpful.

 

The comments in that thread nail it... the industry is moving in this direction and TPlink is moving to irrelevancy. It would be better to ignore your customers' requests than respond with barely veiled hostility that showcases your ignorance. You clearly do not understand the problems solved by these technologies or the technology itself. IPsec plays no role in Tailscale, Cloudflare ZTT, or Wireguard.

 

Please instead respond to a request like this with
"We do not trust that any of our customers have deep networking knowledge or the ability to perform research or read documentation. We do not want to have to support customers with a new technology. Instead we have chosen to use half-implemented legacy VPN technologies because we already have the unhelpful 'help' pages we can paste in response to a support request with minimal effort. It would be too helpful and not in line with our reputation to direct customers to Tailscale's vastly superior documentation"

 

For anyone interested, you can use Tailscale with Ubiquiti...

That is really interesting.

If you are telling me that you can install a Github repo on the UBNT system, then that's not native support. Same for us. That's likely to be a recompile to adjust for the system. But we do not support "wget" in the system or open the system to the public as some other vendors do. Many vendors do not open the system for the sake of stability. That's the orientation of a brand and you probably should know that as you look like to be a pro user.

 

I am totally aware that any of the open-source systems can install the Tailscale as it supports LINUX. I am using Tailscale on my devices and open-source router OS for testing purposes. It has been great for me to use the Tailscale installed on 6 computers I own as "unattended". But I don't agree with this has to be available on the Omada.

 

1. The system got a VPN now and can relay you properly. 

What would be the reason for getting the Tailscale as a top-priority task? Or what kind of feature the router does not have to amend the loss of Tailscale misplacement while you have the VPN function available?

 

2. Yup, new tech, if you want to catch the latest newly released tech, I'd recommend you consider a server in your home/business instead of a pre-built router. That's really not gonna work out if you use a pre-built and commercial product.

 

3. For us, we need to evaluate several perspectives, and think in a company shoe?

  • Security.
  • Followup update to the service.
  • Cost of hardware resources.

 

Should we evaluate if the Tailscale is safe for the people who use the system? I know third-party or plug-ins are wonderful to have. But when you add more third-party stuff, you got more security work to do. We so far have not considered it because it is supposed TBD from this perspective.

Not only from the security perspective, of course, you can use the free server from the Tailscale. Is your business supposed to rely on a third-party server? Ain't the security worry you if you rely on their server?

 

The most common models we have tend to have a low flash and you might have trouble with adding the third-party stuff to it.

https://openwrt.org/docs/guide-user/services/vpn/tailscale/start#installation_on_storage_constrained_devices

With a brief reading alongside the specs of the routers we have, I think you might understand this.

We are not gonna risk adding a single feature to abandon the rest of the features.

 

Our business partners and market team of the local TP-Link have not received Tailscale feedback. The request on the forum has been recorded and counted. We don't think this fits the strategy and orientation of the product as of now. This feature is not on the roadmap in the short term.

Best Regards! If you are new to the forum, please read: Howto - A Guide to Use Forum Effectively. Read Before You Post. Look for a model? Search your model NOW Official and Beta firmware. NEW features! Subscribe for the latest update! ā˜›Download Beta Hereā˜š ā˜› ā˜… Configuration Guide ā˜… ā˜š ā˜› ā˜… Knowledge Base ā˜… ā˜š ā˜› ā˜… Troubleshooting ā˜… ā˜š ā— Be kind and nice. ā— Stay on the topic. ā— Post details. ā— Search first. ā— Please don't take it for granted. ā— No email confidentiality should be violated. ā— S/N, MAC, and your true public IP should be mosaiced.
#16
Options
Re:Tailscale support
2024-10-02 23:00:27

Just another voice to add weight to this - tailscale would be great and omada risks falling behind given other brands are increasingly supporting it - even the cheap travel routers

 

For my use case tailscale is a must over wireguard as it navigates past my CGNAT and life would be made by easier ruining it on directly my routers rather than my current more convoluted methods

#17
Options
Re:Tailscale support
a week ago

I hear the concerns from TPLink on this, but will also say this would be a highly desirable feature.  I run Tailscale on a Ubiquiti EdgeRouter today, and lack of this feature is one of the main things keeping me from migrating to an Omada router.  I know I can install Tailscale on a RasPi or something, but it's just so convenient to have it all handled on the router instead of adding a bunch of extra devices.

#18
Options