• Tailscale Package Now Available on pfSense Software!

    Pinned
    7
    9 Votes
    7 Posts
    5k Views
    S
    For some reason I cannot access my LAN despite advertising it as a 192.168.X.X/24 route in the pfSense Tailscale setting. I am using headscale, running an Ubuntu Tailscale client with the "--accpet-routes=true" option. I can connect to the pfsense 10.64.X.X interface, but no to the LAN beyond it...
  • "Tailscale is not online" problem

    46
    1
    0 Votes
    46 Posts
    16k Views
    L
    @manupfdude Thanks for the info. If I understand correctly, pfSense Tailscale package will ensure tailscaled is running all the time even after reboot, yet Tailscale is actually using your command to authenticate itself, right? The KEY entered in the pfSense Tailscale UI has already expired(or you can enter fake KEY there).
  • How to update to the latest Tailscale version?

    185
    1 Votes
    185 Posts
    74k Views
    E
    @slu Better to update your pfSense since this version is EOL: https://docs.netgate.com/pfsense/en/latest/releases/versions.html#id19 I work remotely 6-7 days a week and can't afford any issues without testing first and having the ability to roll back. I have a cold spare appliance I can physically swap out. I typically wait for a long holiday weekend. Also not pleased about the lack of an offline installer image. Makes the offline restore a lot more complicated Install 2.7.2 using offline image with current config.xml on flash drive Upgrade to 2.8.1 in place.
  • Tailscale online, can reach "LAN side" but can't ping the tailscale IP

    1
    0 Votes
    1 Posts
    918 Views
    No one has replied
  • Tailscale & HAProxy

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Tailscale not online

    19
    0 Votes
    19 Posts
    6k Views
    W
    @totalimpact in my case I dsid not reboot the router, after I copied the new key tailscale went online.
  • can I install a FreeBSD 14 pkg on a FreeBSD 15 pfSense?

    6
    0 Votes
    6 Posts
    1k Views
    V
    With Tailscale, I just recommend sticking with the FreeBSD15 version. Yes, it may currently work using the FreeBSD 14 package despite being on 15, but any number of other updates could result in that not being the case anymore. Not to mention the fact that any updates newer than 1.84.2_1 don't really impact functionality for what people would be using Tailscale for with PfSense so updating past that is not an absolute necessity. I run 1.86.4 on my desktop+phone and 1.84.2_1 on my pfsense router. Phone commonly uses the PfSense router as an exit node and there's no difference for PfSense. TL;DR: Better to be safe than sorry and stick with the FreeBSD 15 version even if it's not the latest version of Tailscale.
  • Tailscale Package Stuck in "Offline" State - GUI Broken After Reinstall

    1
    0 Votes
    1 Posts
    605 Views
    No one has replied
  • One way traffic over Tailscale VPN

    1
    0 Votes
    1 Posts
    504 Views
    No one has replied
  • Tailscale and Firewall Rules

    1
    0 Votes
    1 Posts
    670 Views
    No one has replied
  • Tailscale with pfsense exit node, no DNS

    36
    0 Votes
    36 Posts
    9k Views
    L
    Any luck getting this fixed? I am running into the exact same issue with my setup. Latest Headscale (0.26.1), PFSense 2.7.2, and Tailscale package 1.84.2 installed on PfSense.
  • Tailscale Routes not working on pfsense

    3
    0 Votes
    3 Posts
    2k Views
    A
    @maxpol @TravisH Did you get this resolved? I have th esame issues or very similiar. The first tailnet client works, then when i add additional ones they sometimes work, but majoritvly they fail. PFSense+ latest f/w. All endpoint showing online in tailscale status within pfsense and also on the tailscale portal. Thanks
  • Update to Tailscale package with client ID and client secret.

    1
    0 Votes
    1 Posts
    662 Views
    No one has replied
  • PFSense site-to-site with Tailscale and cloud cam issue

    1
    2
    0 Votes
    1 Posts
    646 Views
    No one has replied
  • Update package?

    3
    0 Votes
    3 Posts
    1k Views
    S
    Thank you, @elvisimprsntr, I did that and it worked beautifully.
  • Detect "login / connection" events from Tailscale package logs

    1
    0 Votes
    1 Posts
    205 Views
    No one has replied
  • Key expiration question

    4
    0 Votes
    4 Posts
    2k Views
    chudakC
    From TS support "I’m Kelly from the Tailscale support team. Thanks for reaching out! This is a common point of confusion- Even with the “Key Expiry: Disabled” option selected in the Tailscale web UI, that only applies to machines authenticated via the web login. You need to generate a Reusable, Ephemeral = false, Pre-Auth Key via the Tailscale admin panel, and use that on the pfsense."
  • Tailscale & IP Alias (public IP)

    1
    0 Votes
    1 Posts
    681 Views
    No one has replied
  • Tailscale UI config Overwrites CLI config on Reboot

    3
    0 Votes
    3 Posts
    1k Views
    B
    @Gertjan Thanks for the reply! Thats what I was afraid of. We have 100s of pfsense/tailscale nodes that we don't have UI access to. We use Ansible to automatically configure them in a remote fashion, everything was fine until this routes issue. But I will check out the link. Thanks again!
  • debug TS errors

    1
    1
    0 Votes
    1 Posts
    726 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.