Optimal setup involves tailscale configuration tailored for remote LAN or server access.
Optimal setup involves tailscale configuration tailored for remote LAN or server access.
Essentially setting up a Proxmox server without connecting it to the WAN network seems like the right path. I explored options like Tailscale and Headscale, but Tailscale feels more suitable at the moment. Right now the focus is on configuring the exit node at home. Should I deploy an Ubuntu Server VM and use Tailscale inside it as the exit node on the bare Proxmox network via its NIC? Or should I run it in an LXC container? Separating hardware seems reasonable. A Raspberry Pi could work too, though I’d prefer something more stable for hosting. My old Thinkpad T430 would be nice if it stayed powered directly from AC, but it’s not ideal as a server. I’m unsure about best practices and would appreciate guidance from someone who has set up Tailscale for this setup. Thanks!
You can deploy the VPN on any device inside your local area network. I wouldn’t set it up directly on Proxmox… though there are exceptions. Instead, create LXC’s, VMs, or Docker containers within those to run the services you need. From a data movement standpoint, each option behaves like a separate machine on your LAN. LXC’s and VMs receive their own IP addresses, allowing you to treat them as independent computers. And yes, I can run my VPN on one of those setups.
Thanks for the feedback! I should have recommended using LXC or VM from the beginning. Currently I have a dedicated server on a thinkpad running Ubuntu Server with many power-saving tweaks. It includes subnet routing and an exit node setup. This works well since it has a large battery—about 6 hours of operation even without power. It connects directly to the LAN through one of its network cards.
I also have a UPS system in place for much of this equipment, which gives me hope it might still work.
As long as your network and internet connections are active, you should be able to reach everything through the VPN.