Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can’t access LAN from iPhone WG app

    Scheduled Pinned Locked Moved WireGuard
    33 Posts 2 Posters 3.4k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H Offline
      hfederau @TommyMoo
      last edited by

      @TommyMoo Hi Tommy, I decided to start with Tailscale first to get acquainted with the technology before moving over to Headscale, however, I am still not able to connect to my local subnet for some reason.
      I have installed everything and the Tailscale web interface shows both my iPhone and my pfSense as connected. I thought I had added my subnet in the pfSense settings screen, but I cannot access my file server (scratching my head)...

      TommyMooT 1 Reply Last reply Reply Quote 0
      • TommyMooT Offline
        TommyMoo @hfederau
        last edited by TommyMoo

        @hfederau Hello, have you enabled your ip-subnet in the Tailscale control center in Edit Route Settings you need to add your subnet which allows tailscale to use / route to?

        when I connect from my iphone, I use not name resolution, but ip of my server which looks like this as an example, I use an app called FE File Explorer Pro on iOS

        where I add the server IP I want to reach under SMB protocoll, port 445, and login and pw

        Maybe its requiered, you reboot every device you installed Tailscale on

        H 1 Reply Last reply Reply Quote 0
        • H Offline
          hfederau @TommyMoo
          last edited by

          @TommyMoo Yes, I added it in pfSense and checked it on the Tailscale web interface. The subnet I am trying to access is 10.25.25.0/24. I added it under the “Advertised routes” in pfSense.
          The file server has a web interface (TrueNas), but I cannot reach it when I enter the IP in my iPhone browser...

          TommyMooT 2 Replies Last reply Reply Quote 0
          • TommyMooT Offline
            TommyMoo @hfederau
            last edited by

            @hfederau In tailscale control Center, are All devices are approved? and KeyExpiry is disableed for your trusted devices?

            H 1 Reply Last reply Reply Quote 0
            • H Offline
              hfederau @TommyMoo
              last edited by

              @TommyMoo They show as connected and I disabled Key Expiry. I am starting to think that my ISP is blocking this sort of traffic, maybe because I am a home user...

              TommyMooT 2 Replies Last reply Reply Quote 0
              • TommyMooT Offline
                TommyMoo @hfederau
                last edited by

                @hfederau Which Tailscale Version is running on your pfsense? mine is -> Bildschirmfoto 2025-09-20 um 21.39.50.png

                1 Reply Last reply Reply Quote 0
                • TommyMooT Offline
                  TommyMoo @hfederau
                  last edited by

                  @hfederau when you check in ControllCenter of Tailscale green Online status indicators behind your devices...things should be OK...and your ISP doesnt block...

                  H 1 Reply Last reply Reply Quote 0
                  • H Offline
                    hfederau @TommyMoo
                    last edited by

                    @TommyMoo Yes, they show green. Is there anything in the Firewall rules I need to change?

                    TommyMooT 2 Replies Last reply Reply Quote 0
                    • TommyMooT Offline
                      TommyMoo @hfederau
                      last edited by

                      @hfederau In your Pfsense Tailscale Menu, you can check STATUS, and see the routes and which ping times, they have.... please check

                      1 Reply Last reply Reply Quote 0
                      • TommyMooT Offline
                        TommyMoo @hfederau
                        last edited by

                        @hfederau I didnt had to do anything in my firewall settings for Taislcale work....

                        H 1 Reply Last reply Reply Quote 0
                        • H Offline
                          hfederau @TommyMoo
                          last edited by

                          @TommyMoo Hmmm…I get the following in the Status screen

                          Health check:

                          - Tailscale could not connect to the 'Denver' relay server. Your Internet connection might be down, or the server might be temporarily unavailable.

                          Report:
                          * Time: 2025-09-20T19:46:44.486120521Z
                          * UDP: false
                          * IPv4: (no addr found)
                          * IPv6: no, but OS has support
                          * MappingVariesByDestIP:
                          * PortMapping:
                          * CaptivePortal: false
                          * Nearest DERP: unknown (no response to latency probes)

                          TommyMooT 2 Replies Last reply Reply Quote 0
                          • TommyMooT Offline
                            TommyMoo @hfederau
                            last edited by

                            @hfederau one more idea I have, can you check, if Taislcale is avaiable for your NAS system? Maybe it has a package manager, or LINUX OS on which you can install Tailscale directly...and connect it to your accounts Tailscale Control Center

                            1 Reply Last reply Reply Quote 0
                            • TommyMooT Offline
                              TommyMoo @hfederau
                              last edited by TommyMoo

                              @hfederau Oh, the Health Test failed... right now, dont know what to say, maybe ther server or your relay, is really down temporaly..

                              Mine looks like this ->

                              Report:
                              * Time: 2025-09-20T19:44:47.132521063Z
                              * UDP: true
                              * IPv4: yes, 91.XX.XX.55:61638
                              * IPv6: no, but OS has support
                              * MappingVariesByDestIP: false
                              * PortMapping:
                              * Nearest DERP: Frankfurt
                              * DERP latency:
                              - fra: 25.4ms (Frankfurt)
                              - nue: 27.5ms (Nuremberg)
                              - ams: 30.8ms (Amsterdam)
                              - par: 38.3ms (Paris)
                              - lhr: 43.5ms (London)
                              - hel: 47.7ms (Helsinki)
                              - waw: 49.4ms (Warsaw)
                              - mad: 54.7ms (Madrid)
                              - nyc: 107.1ms (New York City)
                              - iad: 112.3ms (Ashburn)
                              - tor: 121.7ms (Toronto)
                              - ord: 125.7ms (Chicago)
                              - mia: 131.7ms (Miami)
                              - dfw: 142.2ms (Dallas)
                              - sfo: 167ms (San Francisco)
                              - den: 171ms (Denver)
                              - lax: 173ms (Los Angeles)
                              - sea: 187.6ms (Seattle)
                              - nai: 189.4ms (Nairobi)
                              - jnb: 202ms (Johannesburg)
                              - hnl: 226.5ms (Honolulu)
                              - sao: 247ms (São Paulo)
                              - sin: (Singapore)
                              - syd: (Sydney)
                              - blr: (Bangalore)
                              - tok: (Tokyo)
                              - hkg: (Hong Kong)
                              - dbi: (Dubai)


                              Its a Mesh Network, it should work, and fall back to another node when your Denver relay would be down... Im wondering...

                              1 Reply Last reply Reply Quote 0
                              • TommyMooT Offline
                                TommyMoo @hfederau
                                last edited by TommyMoo

                                @hfederau If I compare, you dont even have an IPv4 adress that Tailcale is using...strange... so it cant work, for some reason, it doesnt get an IPv4 adress of your WAN interface

                                H 1 Reply Last reply Reply Quote 0
                                • H Offline
                                  hfederau @TommyMoo
                                  last edited by

                                  @TommyMoo Maybe something is messed up with my pfSense WAN setup…? BTW, thanks for the help :)

                                  H TommyMooT 2 Replies Last reply Reply Quote 0
                                  • H Offline
                                    hfederau @hfederau
                                    last edited by

                                    I have pfBlockerNG and Snort installed and running. Could they be blocking the traffic? I disabled them for a bit, but didn’t really see a difference

                                    TommyMooT 3 Replies Last reply Reply Quote 0
                                    • TommyMooT Offline
                                      TommyMoo @hfederau
                                      last edited by

                                      @hfederau For comparing, you use which pfsense version, I use CE 2.8.1, and Tailcale version 1.86.4, why I ask, is, pfense 2.7.2 is BSD 14, during the new pfsense 2.8.1 is BSD 15, which then may requiere, we use the right matching Tailscale version.... there is here in the forum, a Thread, for updateing Tailcale... and have an eye for the right BSD version... if you in pfsense 2.7.x you need BSD version 14, if you on pfsense 2.8.x you need the BSD 15 version

                                      1 Reply Last reply Reply Quote 0
                                      • TommyMooT Offline
                                        TommyMoo @hfederau
                                        last edited by TommyMoo

                                        @hfederau For testing, a few minutes, I would disable pfblocker and snort...and reboot, just to see, if then in the Tailscale Menu under STATUS then appears a IPv4 adress from your WAN Interface

                                        1 Reply Last reply Reply Quote 0
                                        • TommyMooT Offline
                                          TommyMoo @hfederau
                                          last edited by

                                          @hfederau please, check out this thread->

                                          https://forum.netgate.com/topic/174525/how-to-update-to-the-latest-tailscale-version?_=1758396205369

                                          1 Reply Last reply Reply Quote 0
                                          • TommyMooT Offline
                                            TommyMoo @hfederau
                                            last edited by

                                            @hfederau Actuallly, if you on pfsense 2.8.1, you should install/update to 1.86.4 in your pfsense shell with the command with date today 20.9.2025:

                                            pkg add -f https://pkg.freebsd.org/FreeBSD:15:amd64/latest/All/tailscale-1.86.4.pkg

                                            If you on pfsense 2.7.2, you on BSD 14, and then you should use this shell command to install/update to latest version (date today 20.9.2025)

                                            pkg add -f https://pkg.freebsd.org/FreeBSD:14:amd64/latest/All/tailscale-1.88.1.pkg

                                            H 2 Replies Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.