tailscale-edgeos | Running Tailscale on Ubiquiti EdgeOS
kandi X-RAY | tailscale-edgeos Summary
kandi X-RAY | tailscale-edgeos Summary
tailscale-edgeos is a Shell library. tailscale-edgeos has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.
Running Tailscale on Ubiquiti EdgeOS
Running Tailscale on Ubiquiti EdgeOS
Support
Quality
Security
License
Reuse
Support
tailscale-edgeos has a low active ecosystem.
It has 176 star(s) with 16 fork(s). There are 10 watchers for this library.
It had no major release in the last 6 months.
There are 2 open issues and 11 have been closed. On average issues are closed in 84 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of tailscale-edgeos is package-repo
Quality
tailscale-edgeos has 0 bugs and 0 code smells.
Security
tailscale-edgeos has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
tailscale-edgeos code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
tailscale-edgeos is licensed under the MIT License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
tailscale-edgeos releases are not available. You will need to build from source code and install.
Installation instructions, examples and code snippets are available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of tailscale-edgeos
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of tailscale-edgeos
tailscale-edgeos Key Features
No Key Features are available at this moment for tailscale-edgeos.
tailscale-edgeos Examples and Code Snippets
No Code Snippets are available at this moment for tailscale-edgeos.
Community Discussions
No Community Discussions are available at this moment for tailscale-edgeos.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install tailscale-edgeos
Enter a root shell. Create the required directories. Fetch the firstboot script. Download the latest MIPS release from https://pkgs.tailscale.com/stable/#static. Different EdgeRouter models use either MIPS or MIPS-LE, so make sure you download the right tarball for your platform. ER-4 is MIPS, ER-X is MIPSLE. Copy the extracted files to /config/tailscale. Run the firstboot script and log in to Tailscale. The example below enables subnet routing for one subnet, enables use as an exit node (Tailscale 1.6+), and uses a one-off pre-auth key, which can be generated at https://login.tailscale.com/admin/authkeys.
Enter a root shell sudo bash
Create the required directories mkdir -p /config/firstboot.d /config/tailscale /config/tailscale/tailscaled.service.d
Fetch the firstboot script curl -o /config/firstboot.d/tailscale.sh https://raw.githubusercontent.com/jamesog/tailscale-edgeos/main/firstboot.d/tailscale.sh chmod 755 /config/firstboot.d/tailscale.sh
Download the latest MIPS release from https://pkgs.tailscale.com/stable/#static Different EdgeRouter models use either MIPS or MIPS-LE, so make sure you download the right tarball for your platform. ER-4 is MIPS, ER-X is MIPSLE. curl https://pkgs.tailscale.com/stable/tailscale_X.Y.Z_mips.tgz | tar -zxvf - -C /tmp
Copy the extracted files to /config/tailscale cp -rv /tmp/tailscale_*/* /config/tailscale
Run the firstboot script and log in to Tailscale The example below enables subnet routing for one subnet, enables use as an exit node (Tailscale 1.6+), and uses a one-off pre-auth key, which can be generated at https://login.tailscale.com/admin/authkeys /config/firstboot.d/tailscale.sh tailscale up --advertise-routes 192.0.2.0/24 --advertise-exit-node --authkey tskey-XXX
(Optional) If you want sshd to explicitly listen on the Tailscale address instead of all addresses: Fetch the override unit curl -o /config/tailscale/tailscaled.service.d/before-ssh.conf https://raw.githubusercontent.com/jamesog/tailscale-edgeos/main/tailscaled.service.d/before-ssh.conf systemctl daemon-reload Exit the shell, enter configure mode and set the listen-address If you don't currently have any listen-address directives, make sure you add any other addresses you want to access the router by, such as a private network IP. N.B. the Tailscale IP can be found in the admin console, or using tailscale status -peers=false | awk '{print $1}' exit configure set service ssh listen-address <Tailscale IP> commit comment "sshd listen on Tailscale IP"
Enter a root shell sudo bash
Create the required directories mkdir -p /config/firstboot.d /config/tailscale /config/tailscale/tailscaled.service.d
Fetch the firstboot script curl -o /config/firstboot.d/tailscale.sh https://raw.githubusercontent.com/jamesog/tailscale-edgeos/main/firstboot.d/tailscale.sh chmod 755 /config/firstboot.d/tailscale.sh
Download the latest MIPS release from https://pkgs.tailscale.com/stable/#static Different EdgeRouter models use either MIPS or MIPS-LE, so make sure you download the right tarball for your platform. ER-4 is MIPS, ER-X is MIPSLE. curl https://pkgs.tailscale.com/stable/tailscale_X.Y.Z_mips.tgz | tar -zxvf - -C /tmp
Copy the extracted files to /config/tailscale cp -rv /tmp/tailscale_*/* /config/tailscale
Run the firstboot script and log in to Tailscale The example below enables subnet routing for one subnet, enables use as an exit node (Tailscale 1.6+), and uses a one-off pre-auth key, which can be generated at https://login.tailscale.com/admin/authkeys /config/firstboot.d/tailscale.sh tailscale up --advertise-routes 192.0.2.0/24 --advertise-exit-node --authkey tskey-XXX
(Optional) If you want sshd to explicitly listen on the Tailscale address instead of all addresses: Fetch the override unit curl -o /config/tailscale/tailscaled.service.d/before-ssh.conf https://raw.githubusercontent.com/jamesog/tailscale-edgeos/main/tailscaled.service.d/before-ssh.conf systemctl daemon-reload Exit the shell, enter configure mode and set the listen-address If you don't currently have any listen-address directives, make sure you add any other addresses you want to access the router by, such as a private network IP. N.B. the Tailscale IP can be found in the admin console, or using tailscale status -peers=false | awk '{print $1}' exit configure set service ssh listen-address <Tailscale IP> commit comment "sshd listen on Tailscale IP"
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page