Hi all
Just wondering, within pfSense, are there are any pitfalls in adding Tailscale vpn connection to an interface?
I noticed that once Tailscale vpn connection is added to an interface, we are able utilise pfSense firewall to provide the access control to what Tailscale devices can or cannot access, contrast to using the ACL in Tailscale web interface.
Seem all tutorials point towards using Tailscale’s web interface to provide the necessary ACL. After seeing Tom’s video and its notes how Tailscale affects the SRC address on the packets, I can understand why the default Tailscale interface within pfSense firewall wont work.
Though what I dont understand is that, if we create a new interface, mapping it to Tailscale vpn connection, allows you to control ACL in pfSense’s firewall. Why is this approach not more talked about? Or are there major pitfalls with this approach?
So yeah, just want to see if Im missing something.
Cheers