<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Remote-Access on The Home Lab</title><link>https://adamazl.github.io/homelab/tags/remote-access/</link><description>Recent content in Remote-Access on The Home Lab</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 15 Mar 2026 00:37:20 +1300</lastBuildDate><atom:link href="https://adamazl.github.io/homelab/tags/remote-access/index.xml" rel="self" type="application/rss+xml"/><item><title>Zero-Config Remote Access with Tailscale</title><link>https://adamazl.github.io/homelab/posts/tailscale-remote-access/</link><pubDate>Sat, 29 Nov 2025 00:00:00 +0000</pubDate><guid>https://adamazl.github.io/homelab/posts/tailscale-remote-access/</guid><description>&lt;h2 id="the-problem-with-traditional-remote-access"&gt;The Problem with Traditional Remote Access&lt;/h2&gt;
&lt;p&gt;Setting up WireGuard or OpenVPN yourself works, but it has requirements:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A public IP (harder to get on CGNAT/IPv6-only connections)&lt;/li&gt;
&lt;li&gt;Port forwarding on your router&lt;/li&gt;
&lt;li&gt;Dynamic DNS if your IP changes&lt;/li&gt;
&lt;li&gt;Key management for each client&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Tailscale removes all of these requirements. It creates an encrypted peer-to-peer mesh network between your devices without any port forwarding, and works through CGNAT, firewalls, and double-NAT.&lt;/p&gt;
&lt;h2 id="how-tailscale-works"&gt;How Tailscale Works&lt;/h2&gt;
&lt;p&gt;Tailscale is built on WireGuard. Each device gets a WireGuard key pair. Tailscale&amp;rsquo;s coordination server (not a relay server) shares public keys between devices so they can establish direct encrypted connections.&lt;/p&gt;</description></item></channel></rss>