# add a apt, tailscale list

curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/jammy.noarmor.gpg \
| sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null
curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/jammy.tailscale-keyring.list \
| sudo tee /etc/apt/sources.list.d/tailscale.list

# then install tailsale

sudo apt-get update
sudo apt-get install tailscale

# then start tailscale

ex) tailscale up \
--operator=$USER \
--accept-routes \
--advertise-exit-node \ # tailscale을 설정한 현재 device로 network traffic을 전송 하도록 설정
--advertise-routes=10.0.0.0/24,10.0.2.0/24,172.18.0.0/24,169.254.69.254/32 \ # tailscale을 설정한 device의 네트워크 대역을 tailnet 그룹에 전파 설정
--hostname=$HOSTNAME
--------------------------------------------------
sudo tailscale up

The easiest, most secure way to use WireGuard.
USAGE
  tailscale [flags] <subcommand> [command flags]

For help on subcommands, add --help after: "tailscale status --help".
This CLI is still under active development. Commands and flags will
change in the future.

SUBCOMMANDS
  up          Connect to Tailscale, logging in if needed
  down        Disconnect from Tailscale
  set         Change specified preferences
  login       Log in to a Tailscale account
  logout      Disconnect from Tailscale and expire current node key
  switch      Switches to a different Tailscale account
  configure   [ALPHA] Configure the host to enable more Tailscale features
  netcheck    Print an analysis of local network conditions
  ip          Show Tailscale IP addresses
  status      Show state of tailscaled and its connections
  ping        Ping a host at the Tailscale layer, see how it routed
  nc          Connect to a port on a host, connected to stdin/stdout
  ssh         SSH to a Tailscale machine
  funnel      Serve content and local servers on the internet
  serve       Serve content and local servers on your tailnet
  version     Print Tailscale version
  web         Run a web server for controlling Tailscale
  file        Send or receive files
  bugreport   Print a shareable identifier to help diagnose issues
  cert        Get TLS certs
  lock        Manage tailnet lock
  licenses    Get open source license information
  exit-node   Show machines on your tailnet configured as exit nodes
  update      Update Tailscale to the latest/different version
  whois       Show the machine and user associated with a Tailscale IP (v4 or v6)
  drive       Share a directory with your tailnet
  completion  Shell tab-completion scripts

FLAGS
  --socket value
        path to tailscaled socket (default /var/run/tailscale/tailscaled.sock)

# tail lock 설정

# tail sign 설정

Add signing node
To add signing devices for your network, you can use the use the Tailscale CLI. Run the following command on the new device you'd like to add.

sudo tailscale lock status

< tailscale lock status >

Copy the tailnet lock key, which begins with tlpub:
Then, from an existing signing device, run the following command.

sudo tailscale lock add 

After which, the first device will be marked as a signing device.

sudo tailscale lock add <copied-key>

 

'IT' 카테고리의 다른 글

Crontab 에서 $RANDOM 활용을 위한 대안  (0) 2024.05.26
Configuring Linux DNS  (0) 2024.05.15
old snap revision delete  (0) 2024.05.15
xauth 설정 및 x11 접속  (0) 2024.05.15
Docker setting  (0) 2023.02.12

+ Recent posts