Remoting into home network options

See..

Thanks for the info, super helpful!

What about MeshCentral?

My understanding is that these options are wireguard under the hood in some way, please correct me if I am wrong. My question is if computers on the network are also using an always on VPN, such as Proton or Mullvad would this cause issues? From what I can tell its not recommended (Mullvad through Tailscale being an exception). Does this mean something like RustDesk is probably a better option? Or possibly @jacek-kubek MeshCentral ?

I use Wireguard with ProtonVPN. Its a bit slow and honestly I do not know who is at fault here (my ISP included).

Netbird and Tailscale use Wireguard; Zerotier does not. The difference is that Wireguard is layer 3 while Zerotier is layer 2. This is the technical difference I was referring to, but for most use cases, the difference won’t matter.

I would configure the private space / work profile on your phone to connect to your home network via Netbird. Then you can either have Proton / Mullvad configured on your router or just block internet traffic completely from Netbird clients. Alternatively, you can tunnel all your traffic on your device to your home network with a VPN on your router, but that makes changing exit servers more cumbersome.

2 Likes

@phnx would using the routing peer function in Netbird instead of port forwarding for something like Plex be considered more secure or private in anyway or is it just a matter of preference?

It does seem like there is a benefit to not having to allow remote connections or open a port.

Been thinking about this with all the Media suggestions in the forum recently.

One thing I was wondering about was how to use Tailscale for home network access as well as a traditional vpn in a non-cludgy way. I think most OSes limit you to one vpn connection at a time.

I saw that Mullvad has an integration with Tailscale but I haven’t given that a try yet. (Currently using Proton) I have some questions about how it works that I haven’t gotten to dive into yet, namely does it try to route all traffic through your router or only “local” traffic, and what happens if said router goes down.

Option 2 would be running Tailscale in a work profile/private space/second user but I don’t know how annoying that would be, and plus I think that’s only android only, at least of the operating systems I use.

Its not globally available apparently (they have a github page with this issue of non-availability globally)

Personally, I use both the VPN server built into the router and Cloudflare tunnels with my own domain. The first option seems more private to me; the second allows me to add redundancy.