You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/posts/tailscale-on-pfsense.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,7 +83,7 @@ To let other devices on our tailnet to route traffic as they were on the pfSense
83
83
1. In the pfSense, navigate to *VPN > Tailscale > Settings > Routing*
84
84
2. Check *Advertise Exit Node*
85
85
3. Click *Save*
86
-
4. In the Tailscale backend, click the three dots by the pfSense machine and click *Edit route settings...*
86
+
4. In the Tailscale backend, click the three dots by pfSense and click *Edit route settings...*
87
87
5. Check *Use as exit node*
88
88
89
89
Now any other device on the tailnet can route their traffic through pfSense by selecting pfSense in their *Use exit node* menu.
@@ -98,7 +98,7 @@ Here we need to decide what subnet to route to, in this example my LAN is `192.1
98
98
99
99
1. In pfSense, navigate to *VPN > Tailscale > Settings > Routing*
100
100
2. Under *Advertised Routes*, add subnet (`192.168.0.0/24`) and press *Save*
101
-
3. In the Tailscale backend, click the three dots on pfSense and click *Edit route settings...*
101
+
3. In the Tailscale backend, click the three dots by pfSense and click *Edit route settings...*
102
102
4. Under *Subnet routes*, check the newly added subnet
103
103
104
104
You should now be able to access the LAN behind pfSense from any device on your tailnet.
@@ -109,10 +109,9 @@ You should now be able to access the LAN behind pfSense from any device on your
109
109
IP addresses aren't always fun to use, especially when pfSense has a nice DNS server with records for all local hosts via the DHCP reservations.
110
110
To be able to access the hosts on the internal subnet behind pfSense via their hostname we need to tell Tailscale to use pfSense's DNS server.
111
111
112
-
1. On the Tailscale backend, navigate to *DNS > Nameservers*
112
+
1. On the Tailscale backend, navigate to [*DNS > Nameservers*](https://login.tailscale.com/admin/dns)
113
113
2. Press *Add nameserver > Custom...*
114
-
3. Under *Nameserver*
115
-
1. Enter the internal IP address of the pfSense box (or where the internal DNS server is hosted)
114
+
1. Under *Nameserver*, enter the internal IP address of the pfSense box (or where the internal DNS server is hosted)
116
115
2. Enable Split DNS by checking *Restrict to domain*
117
116
3. Enter the domain name suffix, e.g. `example.com` to be able access a host with `server.example.com` as hostname. This way only the internal records are resolved by pfSense.
0 commit comments