wateralien
a day ago
I never travel without my GL-AXT1800. Saved me so many times: https://www.gl-inet.com/products/gl-axt1800/ I’m actually on it right now.
guiambros
a day ago
Same! And the best thing is that you can install Tailscale, so you can connect to your tailnet, and exit all traffic through one of your nodes (e.g., your home/office network).
It's incredibly useful, with the added bonus that you don't need to install tailscale client in any of your travel devices (phone, tablet, work computer, etc).
jasonkester
21 hours ago
I’m seeing a lot of this same comment here, so I went to check out this tailscale thing, which clearly I must need.
Can anybody explain what Tailscale is, does, or why everybody seems to have it?
Looking at their website, it’s just a huge wall of business jargon. Really! Read it. It’s nothing but a list of enterprise terminology. There’s a “how it works “ page full of more (different) jargon, acronyms and buzzwords, but no simple explanation of why everybody on this thread seems to be paying money for this thing?
Any help? Should I just pay them my $6/month and hope I figure it out at some point?
QuiEgo
13 hours ago
It's a wrapper around Wireguard that lets you use common SSO providers (Apple ID, Google, etc) to manage access.
It also handles looking up the IP address of your "nodes" through their servers, so you don't need to host a domain/dns to find the WAN IP of your home network when you're external to it (this is assuming you don't pay for a fixed IP).
Most people put an instance of it on a home server or NAS, and then they can use the very well designed and easy to use iOS/mac/etc client to access their home network when away.
You can route all traffic through it, so basically your device operates as if you're on your home network.
You can accomplish all of this stuff (setting up a VPN to your home network, DNS lookup to your home network) without Tailscale, but it makes it so much easier.
matwood
13 hours ago
TS makes it super easy to use a VPC I have in the US as my VPN exit while I live in other parts of the world. Apps that work on phones, computers, and my AppleTV are big pluses over Wireguard which I have also used.
ryandrake
13 hours ago
I was still completely mystified until your last sentence. And now I'm just mostly mystified. I, too, keep hearing Tailscale Tailscale Tailscale from HN commenters but have no idea why I'd need it. For anything I need to access on (or from) my home network I just use a VPN I've hosted in my home for the last decade or so.
QuiEgo
12 hours ago
If you've already got a VPN solution your happy with, Tailscale probably adds very little value for you. It's just basically the easiest / most user friendly way to setup a VPN to your home network.
It can do way more than just being a VPN-to-home, but that's how most users use the free part.
gertrunde
21 hours ago
Basic version is it's a sort of developer focused zero trust network service.
Encrypted overlay network based on wireguard tunnels, with network ACLs based around identity, and with lots of nice quality-of-life features, like DNS that just works and a bunch of other stuff.
(Other stuff = internet egress from your tailscale network ('tailnet') through any chosen node, or feeding inbound traffic from a public IP to a chosen node, SSH tied into the network authentication.
There is also https://github.com/juanfont/headscale - which is a open source implementation of some of tailscale's server side stuff, compatible with the normal tailscale clients.
(And there are clients for a very wide range of stuff).
jasonkester
21 hours ago
I can’t tell if you’re trying to help, or just getting into the spirit of the website’s “how it works (using ten pages of terminology and acronyms we just made up)” page.
viccis
20 hours ago
None of the terminology or acronyms that user used were made up or unique to this. I think you are blaming other people for your unfamiliarity with this kind of tech.
It is simply a managed service that lets you hook devices up to an overlay network, in which they can communicate easily with each other just as though they were on a LAN even if they are far apart.
For example, if you have a server you'd like to be able to SSH into on your home network, but you don't want to expose it to the internet, you can add both it and your laptop to a Tailscale network and then your laptop can connect directly to it over the Tailscale network no different than if you were at home.
jasonkester
20 hours ago
Sorry if I appeared rude. That was very much tongue in cheek.
But notice how you just did a much better job of explaining what this thing does without using any jargon at all. The jargon helps if everyone already knows what you’re talking about. It hurts if anyone doesn’t.
That’s what I’m poking fun at. There’s a trait in lots of engineers I’ve worked with over the years to be almost afraid to talk about tech stuff in layman terms. Like they’re worried that someone will think less of them because they used words instead of an acronym. Like they won’t get credit for knowing what a zero trust network is if they describe the concept in a way that regular people might understand.
One of those guys was certainly in charge of this company’s website copy.
aembleton
19 hours ago
> But notice how you just did a much better job of explaining what this thing does without using any jargon at all.
There was plenty of jargon and acronyms like LAN and SSH. You're just used to those ones.
throw5f3d5y
14 hours ago
Perhaps if we were on Reddit, and also on a general subreddit, then people would speak in less technical terms.
Since this is HN, it’s almost expected the participants here would either know the terms, or at the very least be able to find out what they mean on their own and realize it’s not made up jargon but rather common industry terms.
Tailscale is not trying to sell to the average buyer, it’s trying to sell to a specific audience.
arcanemachiner
20 hours ago
Your ignorance of the topic is no excuse to be rude to someone who's trying to help you.
jaapz
20 hours ago
That's just networking jargon
KnuthIsGod
21 hours ago
Basically it is managed Wireguard. Tailscale does say it, but it is buried under marketing speak.
walthamstow
19 hours ago
It's also P2P mesh rather than hub and spoke which is quite important
SOLAR_FIELDS
14 hours ago
It’s worth pointing out that it can be both. The hub and spoke model, relays, is often used for cloud setups where the overhead of installing clients on nodes is not worth the tradeoff
quaintdev
20 hours ago
This. People are doing the same thing that OP mentioned in this thread.
dxxvi
13 hours ago
Not sure if anybody gives you the answer to "what is tailscale?". So, this is my answer (hopefully it's correct and simple enough to understand).
Tailscale allows devices that can access the Internet (no matter how they access the Internet) to see each other.
To do that, you create a tailscale network for yourself, then connect your devices to that network, then your devices can see each other. Other devices that are connecting to the Internet but not to our tailscale network won't see your devices.
AI might explain it better :-) Don't know why I wanted to explain it.
konradb
21 hours ago
I don't think you need to pay $6 a month to try it out.
Install it on all the machines you want. When you are running it on the machine, it is networked to the other machines that are running it. Now make an 'exit node' on one of those machines by selecting it in the UI, and all your gear can access the internet via that exit node. Your phone can run it. Your apple tv can run it. You can have multiple exit nodes. So you can have a worldwide network and not once did you have to open ports in firewalls etc.
Tor3
17 hours ago
How does it compare to Zerotier? The way I understand it it's kind of overlapping functionality but not necessarily everything. What I want from Zerotier is basically what you described about Tailscale.
The two problems I have with zerotier are:
1) It's supposed to let a mobile device like an Android tablet route its traffic through zerotier (functioning as a VPN to my home site, in this case). However, I've never got that to work. It's running, but doesn't affect anything network-wise for the other applications (unlike running e.g. openvpn on it)
2) On a couple of computers with specific routing set up to various destinations, when Zerotier runs it simply blocks all of that and there's no way for me to continue accessing anything else than the Zerotier network. No fiddling with routing tables etc. changes any of that. On other computers, also some running OpenVPN, Zerotier does not interfere. I've never figured out what causes this.
So, in short, I'm pondering if I should ditch Zerotier and try Tailscale instead. If it does the same - I simply want a way to connect my devices, but I also don't want to lose total control over routing. For mobile devices I would want full VPN, for computers I don't. Edit: So, I'm both after connecting my multiple networks, as well as VPN'ing certain things or devices through another location.
Thanks for any input on this.
rainsford
15 hours ago
Having tried both Zerotier and Tailscale, I found Tailscale to be a significant improvement. Tailscale uses Wireguard as the base encrypted protocol instead of a semi-homebrew protocol Zerotier came up with that notably lacks things like ephemeral keys/perfect forward secrecy. Tailscale also has a faster pace of improvement and is responsive to customer asks, regularly rolling out new features, improving performance, or fixing bugs. Zerotier by contrast seems to move slower, regularly promising improvements for years that never materialize (e.g. fixing the lack of PFS).
My last gripe is more niche, but I found Zerotier's single threaded performance to be abysmal, making it basically unusable for small single core VMs. My searching at the time suggested this was a known bug, but not one that was fixed before I switched to Tailscale. Not impossible to work around, but also the kind of issue that didn't endear the product to me or inspire confidence.
jasonkester
20 hours ago
So, somewhere on that website, there’s a free version that can be downloaded onto a desktop and run without signing up for their service?
I think I understand what it does now. So, basically you leave a computer running at home, and this thing lets you pretend to be running your internet stuff through it while you’re on the road?
konradb
19 hours ago
> So, somewhere on that website, there’s a free version that can be downloaded onto a desktop and run without signing up for their service?
If you go to https://tailscale.com/pricing?plan=personal
The first plan on the left called 'Personal' is free.
It uses a central orchestrator which is what requires you to sign up. If you prefer to self host your orchestrator you can look into Headscale, an alternative that seeks to be compatible with the clients.
> So, basically you leave a computer running at home, and this thing lets you pretend to be running your internet stuff through it while you’re on the road?
That's one thing you can do with it, yes. You can also run custom DNS entries across it, ACLs, it is very flexible.
jasonkester
19 hours ago
Ugh. On mobile, the first plan on the pricing page is “ starter” for $6. The plan to the right is partly visible, indicating that you can scroll that way. There’s nothing to indicate that you can scroll left.
A less hostile website design would have (again) saved me a question.
mcsniff
16 hours ago
It seems like it defaults to Business, which is paid. If you tap "Personal" you'll see the free plan.
Sorry, but try a little harder. Tailscale isn't hostile, but it seems you are -- you claim to think you need it, but don't know what it does and can't put in the effort to determine and foist those inabilities on Tailscale?
I've been using Tailscale for many years now and they have a terrific product.
flkiwi
15 hours ago
Tailscale is one of the simplest, most useful things I use. I only use the personal plan, but I keep toying with signing up for paid because it’s a damn good product.
omnimus
20 hours ago
The service is free up to certain amount of connected people and devices. You most likely don't need to pay for it. I am pretty heavy user and don't. It is virtual private network orchestrator. It allows you to connect to other devices that you add to your network as long as they are connected to the internet. So your office computer, home server or NAS. If you have some home automation like home assistant you can connect to it from anywhere. That kind of stuff.
barrkel
17 hours ago
You can run it on a capable router or on a RPi, or on your NAS. It's especially useful if you want to self-host (e.g. Immich). You can use it to authenticate for ssh if you like, or simply give you an IP you can ssh to.
It's especially handy if you want a secondary way in, in case you have problems connecting using wireguard, since it supports using a relay if you're stuck in a hotel with a heavily restricted connection.
If you run DNS at home, you can even configure it to use your home DNS and route to your home subnet(s).
rahimnathwani
18 hours ago
Sign up for free using Google Sign In.
Install the tailscale client on each of your devices.
Each device will get an IP address from Tailscale. Think about that like a new LAN address.
When you're away from home, you can access your home devices using the Tailscale IP addresses.
bogwog
16 hours ago
So basically wireguard, but you have to pay for it, and you have create an account through Google/Apple/Microsoft/whatever.
Wireguard is not that hard to set up manually. If you've added SSH keys to your Github account, it's pretty much the same thing. Find a youtube video or something, and you're good. You might not even need to install a wireguard server yourself, as some routers have that built in (like my Ubiquity EdgeRouter)
rainsford
15 hours ago
It's not really "basically wireguard" and you don't have to pay for it for personal use. Wireguard is indeed pretty easy to set up, but basic Wireguard doesn't get you the two most significant features of Tailscale, mesh connections and access controls.
Tailscale does use Wireguard, but it establishes connections between each of your devices, in many cases these will be direct connections even if the devices in question are behind NAT or firewalls. Not every use-case benefits from this over a more traditional hub and spoke VPN model, but for those that do, it would be much more complicated to roll your own version of this. The built-in access controls are also something you could roll your own version of on top of Wireguard, but certainly not as easily as Tailscale makes it.
There's also a third major "feature" that is really just an amalgamation of everything Tailscale builds in and how it's intended to be used, which is that your network works and looks the same even as devices move around if you fully set up your environment to be Tailscale based. Again not everyone needs this, but it can be useful for those that do, and it's not something you get from vanilla Wireguard without additional effort.
ryandrake
12 hours ago
I guess I'm still not following. Is there an example thing that you can do with Tailscale that you can't do with Wireguard? "Establishes connections between each of your devices" is pretty vague. The Internet can already do that.
aftbit
11 hours ago
You can run two nodes both behind restrictive full cone NATs and have them establish an encrypted connection between each other. You can configure your devices to act as exit nodes, allowing other devices on your "tailnet" to use them to reach the internet. You can set up ACLs and share access to specific devices and ports with other users. If you pay a bit more, you can also use any Mullvad VPN node as an exit point.
Tailscale is "just" managed Wireguard, with some very smart network people doing everything they can to make it go point-to-point even with bad NATs, and offering a free fallback trustless relay layer (called DERP) that will act as a transit provider of last resort.
seabrookmx
11 hours ago
I install tailscale on my laptop. I then install tailscale on a desktop PC I have stashed in a closet at my parents. If they are both logged in to the same tailnet, I can access that desktop PC from my home without any addition network config (no port forwarding on my parents router, UPNP, etc. etc).
I like to think of it as a software defined LAN.
Wireguard is just the transport protocol but all the device management and clever firewall/NAT traversal stuff is the real special sauce.
daveoc64
15 hours ago
Tailscale is free for pretty much everything you'd want to do as a home user.
It also doesn't constantly try and ram any paid offerings down your throat.
I was originally put off by how much Tailscale is evangelised here, but after trying it, I can see why it's so popular.
I have my Ubuntu server acting as a Tailscale exit node.
I can route any of my devices through it when I'm away from home (e.g. phone, tablet, laptop).
It works like a VPN in that regard.
Last year, I was on a plane and happened to sit next to an employee of Tailscale.
I told him that I thought his product was cool (and had used it throughout the flight to route my in-flight Wi-fi traffic back to the UK) but that I had no need to pay for it!
nottorp
18 hours ago
They still tie you to Google?
fragmede
18 hours ago
Microsoft, Github, and Apple login are the other options if you don't want to use Google.
drnick1
7 hours ago
Great, yet another opportunity for Big Tech to track people. I’ll stick to my Wireguard setup, I have a fixed IP and would rather have full control of what is happening by setting up the keys myself than trust a third party.
nottorp
18 hours ago
So zero options that will not tie their service to some other service still.
So much for resilience.
PeterStuer
20 hours ago
A system by wich you can expose things on your private network (e.g. your home lan) so you can selectively and securely make them accesible from other places (e.g. over the Internet). You can do all this without tailscale by just configuring secure encrypted tunnels (wireshark, traefic, ...) yourself, but services like tailscale provide you with easy gui configuration for that.
I personally use Pangolin, which is similar https://github.com/fosrl/pangolin
rpdillon
9 hours ago
For me: it's a way to access services I host on my homelab LAN from 3000 miles away. Having a router that automatically logs into that and routes TS addresses properly allows you to use all your devices connected to that router to access TS services with no further configuration. I host Kiwix, Copyparty, Llama.cpp, FreshRSS, and a bunch of other services on my homelab, and being able to access all of those remotely is convenient.
weinzierl
19 hours ago
Extending the question:
In my mind Tailscale was primarily to expose local services but answers here sound a bit as if people used it as a VpN replacement.
If I do not want to expose local services but only protect me and hide from untrusted WiFi, would I better use a traditional VPN or Tailscale?
My thinking is that Tailscale could be the better VPN because they have a clean business model while pure VPN companies are all shady.
__jonas
16 hours ago
> In my mind Tailscale was primarily to expose local services
You might be thinking of tailscale funnel:
https://tailscale.com/kb/1223/funnel
Which is nice, but still a beta feature. Tailscale itself is indeed a mesh VPN that lets you connect all your devices together.
> If I do not want to expose local services but only protect me and hide from untrusted WiFi, would I better use a traditional VPN or Tailscale?
It does NOT by default route all your internet traffic through one of its servers in order to hide it from your ISP, like the type of VPN you might be thinking of (Mullvad, ProtonVPN etc.).
Though you CAN make it route all the traffic from one of your devices through another, which they call an 'Exit Node'. They also have an integration with Mullvad, which allows you to use Mullvad servers as an exit node. Doing that would be identical to just using Mullvad though.
barrkel
16 hours ago
Tailscale can tunnel all your traffic through a chosen exit node so you browse the web and whatnot as if you were at home (or wherever the exit node is), so in this way it's a bit like a VPN from a VPN company, but it doesn't give you a list of countries to select from.
VPN companies aren't really in the business of selling VPNs. They sell proxies, especially proxies that let you appear to come from some country, and you typically connect to the proxy using the VPN functionality (particularly if you're using a consumer device instead of a laptop), but often you can use SOCKS5 instead.
Tailscale isn't in the business of selling proxies.
hhh
19 hours ago
Tailscale is an enterprise vpn, connecting multiple of your networks, where as consumer vpns just make your network traffic exit from their network.
I run a tailscale exit node on an anonymous vps provider to give me a similar experience to a consumer vpn.
remco_sch
20 hours ago
It's a virtual network switch/router with DHCP, DNS, and lots more enterprisey features on top. You 'plug' devices into it using a VPN connection.
gunalx
13 hours ago
Also the free tier is sufficient for basically anything non power-user or enterprice.
Lammy
20 hours ago
It's a cryptographic key exchange system that allows nodes to open Wireguard tunnels between each other. They have a nice product, but I don't like how it spies on your “private” network by default: https://tailscale.com/kb/1011/log-mesh-traffic
If you want to self-host, use NetBird instead.
davnicwil
19 hours ago
they have an excellent set of short intro videos [0] on youtube, that's what I used to get an overview and get set up.
frio
21 hours ago
You don't need to get too far down the page to see "VPN", which is what it is. But on top of that primitive, it's also a bunch of software and networking niceties.
npodbielski
20 hours ago
It just virtual private network.
tomjen3
19 hours ago
It’s a point to point vpn that works between devices even without a direct network connection.
Their personal free plan is more than enough.
kstrauser
13 hours ago
We’re from the US but were recently in Germany. Sometimes we were completely exhausted after a long day and just wanted to rest in our room a little before going to sleep. Our motel had like 2 English speaking channels and both sucked. We watched a lot of German TV because it was interesting, even if we could barely understand what was going on. After some time doing that, it was a pleasure watching some Hulu, courtesy of connecting to WireGuard back at our house in California so that we had an American IP.
brewdad
8 hours ago
I did the same thing recently while visiting family in SE Asia. I wanted to watch my team's bowl game but American college football is unknown in that part of the world. A Wireguard connection back to my home router gave me the ESPN access I pay for in the US.
A few services didn't work because they required my mobile device's location services (which still showed my in Asia). I'm sure I could have found a workaround for that but wasn't properly motivated to put in the effort for a short visit.
In a similar vein, I was able to troubleshoot a problem with our NAS from a cellular connection on a boat near Bali a couple years ago. My son needed access to some files for his college homework but couldn't access it remotely. I was able to access it and reconfigure a setting that had changed during an update and restore his access.
The internet feels like magic sometimes.
master_crab
15 hours ago
I do want to point out that dumping all of your traffic through a home/office network is not always a good idea. YMMV, but if you are in, say, LA, and pushed your 0.0.0.0 traffic through your home in NY, you just added quite a bit of latency.
This is great for keeping things in a LAN, but make sure you use your network rules correctly and don’t dump everything to your home network unless you need to.
(I too have a gli slate, but I use UI at home so will consider this when it comes out)
malfist
14 hours ago
I disagree. DNS is generally unencrypted and leaking that over whatever open wifi you're on is generally worse from a privacy perspective than the latency you add bouncing through your home where you probably have encrypted DNS setup.
Even if you don't visit any http sites, you never know what might phone home over http, so an OS level VPN provides foolproof privacy at the cost of a tiny bit of latency.
jms703
12 hours ago
Using encrypted DNS doesn't necessitate routing all your traffic through your home network. You can still encrypt all your traffic by using an encrypted DNS service or, if you really want to, a VPN service. But moving everything through your home network is not necessary, especially if you have any kind of usage caps.
master_crab
11 hours ago
And to further reinforce this point, one of the basic config variables for wireguard is your dns servers. You could literally send no traffic but your dns queries to the wg tunnel.
malfist
10 hours ago
DNS is just one example. Like I said on my post you never know what data might be sent home in plaintext
kwanbix
15 hours ago
> with the added bonus that you don't need to install tailscale client in any of your travel devices (phone, tablet, work computer, etc).
I am sorry, this confuses me. If I don't have a lclient, for example in my laptop, how does my laptop uses Tailscale then?
Also, TailScale Personal says 3 users. Is that a problem for as we are 4? (me, wife, son, doughter).
mbreese
15 hours ago
If Tailscale is installed on your router, then any client will also be able to connect to Tailscale networks.
Fo example, if you have a default route back to your home network on the router, any client will also connect through that tunnel back through your home. This assumes you are using your travel router to connect your laptop as opposed to say the hotel wifi. (In this scenario, your travel router is connected to both the hotel wifi as an uplink and Tailscale.)
kwanbix
15 hours ago
Oh, got it.
What about the users? Do I need 4 for my family of 4? Or are the 3 users included in the free plan just admin users?
devilbunny
14 hours ago
You only need separate users if you want to restrict certain features (devices, apps, etc.) to only certain users (i.e., it's more of a business thing). My wife's machines all use my username because... she lives with me; if she wanted suddenly to learn networking and computers and hack all our stuff, she could do it anyway since she has physical access.
So pretty much anyone you would trust on your LAN can be trusted with your Tailscale user. You can just log yourself into Tailscale on the kids' devices and then use the admin console to make those devices' logins never expire. They can use all the features, but they don't know your authentication method and thus can't get admin access themselves. About the only situation in which the typical home user would need multiple accounts would be if someone was physically away from you and had a new device they needed to connect to your tailnet (their term for your collection of devices, services, etc.) but you didn't want to share your password with them. If they're physically near you, you just authenticate their device and hand it back to them.
nxobject
14 hours ago
For what it's worth, you get 100 devices total, regardless of number of user accounts. If you don't need the permissions granularity that individual accounts have, consider only having an "admin" and "untrusted" account... or a single account, and pinky promise your family not to play with it.
echelon
a day ago
These are neat in that you can jump on and extend existing wifi infra, but it'd be nice if they also included 5G. I want a product that does both.
It's cool to have your own network in a hotel. But it'd be nice to be able to do that on the road, away from public wifi, internationally, whenever - which hotspots do. But at the same time, it'd be nice to be able to do the WiFi thing too to cut back on data usage. I frequently blow through my hotspot data.
I'd rather this be in one device instead of two. Beggars can't be choosers, though, I suppose?
sokoloff
21 hours ago
I’m using a GLinet GL-XE3000 for that and it’s great. Initial setup of the 5G eSIM on a physical SIM took a little searching but it’s been rock solid and having consistent access on the road and hotels has been great for family travel. It has a built-in battery, but I’ve never really tested the duration (I suspect it’s 3-6 hours) as I put it on its AC adapter in the hotel and the n a cigarette lighter adapter in the car, so the battery gets used 15-45 minutes at a time to bridge between those two places.
I like it enough that I might buy a second, more compact unit for when space is more a premium, but I’ve been really happy with this one.
SergeAx
4 hours ago
What is your usage scenario for this device? It's $400 and 3/4 kg.
sokoloff
3 minutes ago
I bought that specific model to provide connectivity for our robotics team’s pit computers. For this need, good antenna performance is key, since different venues differ wildly in WiFi and cell coverage and when we setup the evening before comps, I want the best chance of getting a solid connection and offering it to the pit LAN.
But now that I have it, the device is handy for family travel as well. Put an unlimited data eSIM in the device and everyone has “unlimited” data n the road and when we arrive at a hotel or AirBnB, one person signs it on to wifi and everyone is connected, including tailscale connections to home.
If I was doing personal and work travel only, I’d look for a smaller unit, but still with a decent battery.
cosmosgenius
a day ago
Is this any better than just doing Hotspot with wifi bridge? I just have my hotspot on my pixel for my devices to connect to. Pixel itself is connected to whatever "public wifi" is there.
PeterStuer
20 hours ago
Your hotspot just makes the untrusted hotel wifi available via your phone wifi. The networks between your computer and your target services can still inspect and alter your data. Tailscale, or more specifically the Wireshark underneat, sets up an encrypted tunnel so those "untrusted" intermediate networks can't do that.
aembleton
19 hours ago
If my phone has a VPN to my home server, then it should all be encrypted.
SXX
19 hours ago
Yes, but it wont work for sharing mobile internet because VPN doee not apply to tethering unless you have root. On Android there is also WiFi direct, but it's not very reliable and require proxy / not work for everything.
SpaceNugget
15 hours ago
s/Wireshark/wireguard
bentcorner
13 hours ago
In my experience hotels throttle wifi connection per device (IP/Mac address or whatever) and so you'd be better off using something that can use the wired connection in your room (which is usually unthrottled or has higher bandwidth) and be an AP for your personal devices.
If you don't have a wired connection then this wouldn't be any better, except for any connectivity features it might offer (probably some vpn capability).
I have a gl-inet device and it does pretty much all I need whenever I travel.
kstrauser
13 hours ago
Hotels in Las Vegas typically charge around $15/day per connected device. Want to download a new book on your Kobo and play Diablo for a few minutes? That’ll be $30, please!
That’s the real win of a travel router, IMO.
SergeAx
4 hours ago
Is this a common occurrence in the US? It sounds worse than tipping culture.
gruez
a day ago
Does that actually work? I don't think you can both have hotspot on and be connected to another network.
esperent
a day ago
Most newer (or at least new + expensive) phones can share their wifi connection via hotspot. 2.4gh only though I think.
mi_lk
21 hours ago
Do you know what’s the technical term to search if a phone has that capability? Asking for an iPhone
jibe
12 hours ago
Unfortunately, iPhone can't bridge wifi networks, which makes travel routers particularly useful if you have an iphone, and a laptop, and are staying at a hotel with wifi.
eyeris
21 hours ago
Like WiFi tethering?
einarfd
19 hours ago
My iPhone calls it personal hotspot.
brewdad
8 hours ago
It's my understanding that personal hotspot can only utilize the cellular connection for the internet side since the wifi connection is being used to connect clientside. If one is hoping to use hotel wifi rather than their cellular plan data, Apple's solution won't work.
I'd be happy to be proven wrong on this however.
user_7832
21 hours ago
Not only new and expensive, my 5 year old budget phone could do it (a vivo).
panarky
a day ago
Yes, it has actually worked starting with the Pixel 3.
It's called Dual-Band Simultaneous or "STA+AP" (Station + Access Point) concurrency that can bridge an existing wifi connection to an access point to other devices via a hotspot.
dorfsmay
a day ago
Yes it works. Now you can also tether via USB. Both of them have worked flawlessly for me recently.
Doohickey-d
a day ago
It seems to be only on certain devices feature(?): on my Pixel it worked, Samsung phone just says "sorry, can't do that".
muppetman
21 hours ago
Works fine, yup.
kleinsch
a day ago
Huge plus one. Useful to bridge hotel wifi so all my devices connect automatically, also useful as an ad-hoc router that fits into my travel pack.
hakfoo
a day ago
I'm not using it for travel, but I got a GL-BE3600 recently and it's surprisingly decent as a home router for my very specific needs.
I wired the desktop PCs in the house, so the only Wi-Fi users are mobiles, a smart TV, and a laptop. Everything else is already hanging off 2.5G wired switches. Pretty light duty, and I just wanted something that would provide robust routing and placeholder Wi-Fi. This does exactly that, and since it's OpenWRT based, it's probably marginally less terrible than whatever TP-Link was offering in the same price range.
It does run annoyingly hot, but I should just buy a little USB desk fan and point it at the router :P
amluto
a day ago
I've had very impressive success running upstream OpenWRT on TP-Link hardware: I have Archer C7 access points running with literally years of uptime.
That being said, for any new application, I suggest using at least an 802.11ax AP, because cheap 2.4GHz devices that support 802.11ax are becoming common and using an 802.11ac router means that your 2.4GHz devices will be stuck with 802.11n, which is quite a bit less efficient. Even if you don't need any appreciable speed, it's preferable to use a more efficient protocol that uses less airtime.
skirmish
7 hours ago
Ditto, the TP-Link's Archer A7 firmware is a security nightmare [1] but with DD-WRT installed it is very stable and reliable.
[1] Daughter invited ~10 classmates to prepare for a science competition, and one of them had a virus (I assume) that hacked TP-Link's firmware to draft it into a botnet. WAN connection would drop every hour for a few minutes, plus unexplained internet traffic while nobody was using it. Resetting firmware did not help, installing DD-WRT fixed it once and for all.
hakfoo
11 hours ago
I think I actually retired an Archer C7 for this. The goal was something 2.5G ready because the city has systematically rolled out fibre to every neghbourhood around here and I'm just waiting for the knock.
rpcope1
13 hours ago
Honestly if you're not invested in maybe Ruckus or Aruba, I don't think there's much better than OpenWRT on a decently supported AP. I had a bunch of the C7s with OpenWRT and they've been totally bulletproof. I only upgraded to R650s recently and it's not clear beyond maybe the antenna setup and the fact that it's ax now that it's much better.
georgebcrawford
a day ago
I have the same router as the OP article - it ran at 72C until I did [this](https://phasefactor.dev/2024/01/15/glinet-fan.html#choosing-...). Currently running at 60C!
kstrauser
a day ago
Heartily seconded! A friend recommended I get one and now I push all my other technical friends to buy one, too.
My wife and I traveled a bit this year and it was great having all our gadgets connecting to a single AP under our control. It’s easily paid for itself by avoiding ludicrous per-device daily charges.
windexh8er
a day ago
I think most travel APs can generally do this, but the feature that makes GL.iNet products popular is: extensibility. I'm not sure why this is so hard to understand for manufacturers, but making products useful via extensibility is a sure fire way to open your target market directly up to prosumers. And those are the buyers that will find you.
I own two of their products, one of them I bought in 2019 and can still run what I need to on it.
xgbi
a day ago
My wife’s work WiFi is handled by a gl.inet 150 (https://www.gl-inet.com/products/gl-ar150/) which is tucked behind her desk since at least 2019. Vanilla openwrt on it, provides WiFi from an Ethernet slot in the wall.
Uptime is in years, it’s invisible and chugs along without visible power draw. All her devices connect to it, including her Cisco voip phone. It autossh to my ovh server with remote port forward for remote admin. Cost me 15€ in 2016.
TeMPOraL
21 hours ago
>> I'm not sure why this is so hard to understand for manufacturers
> My wife’s work WiFi is handled by a gl.inet 150 (...) since at least 2019. All her devices connect to it (...) Cost me 15€ in 2016.
I think this answers GP's question as (yet another) solid reason why manufacturers "can't understand" prosumer needs - it's because targeting prosumers, or generally making products that "just works", is very bad for sales down the line.
qilo
15 hours ago
Hehe. Bought TP LINK TL-WR1043ND (one of the first models of affordable home routers with integrated gigabit switch) in 2012 for $40 (maybe $50, but not more), flashed OpenWrt and still using to this day.
copperx
20 hours ago
Isn't this considered to be "shadow IT"? and some enterprise networking devices have automated detection for such setups, I believe (?)
xgbi
19 hours ago
She's her own boss and shares her office space with 4 other people in medical space, no shadow IT there.
Since her desk is far from the internet router, I added this little guy for her to have less cables and allow more connectivity.
ssl-3
18 hours ago
Maybe, maybe not.
Some companies aren't very big, and neither are their budgets. And of course, it might be said that there is no solution more permanent than a temporary one.
We've got a large-ish color laser printer (IIRC, an HP 4600) at one of our locations. It's not a big place; it has only had as many as 3 people working there regularly and has been normally staffed by exactly 1 person for the last several years.
When we moved into that building, a missing link was noticed: The printer did not feature wifi, and there was no way to get a clean ethernet drop to it without visible external conduit. The boss man didn't like the idea of conduit.
To get it working for now, I went over to Wal-Mart and bought whatever the current rev of Linksys WRT54G was. I put some iteration of Tomato on it so it could operate in station mode and graft the printer into the wifi network.
I plugged that blue Linksys box in back in 2007; it turned 18 years old this year.
It's pretty little slow by modern wifi standards, and the 2.4GHz band is much more congested than it used to be, but: It still works, and nobody seems motivated to spend money to implement a better solution... so it remains.
WhyNotHugo
a day ago
Readers of HN will value flexibility and extensibility, but the other 99% of the folks there are fine with totally locked-down devices because it’s the only thing they know of. The lack of extensibility likely doesn’t affect sales/profit in any significant proportion.
dzhiurgis
a day ago
Where do you travel that you need wifi?
I’ve been getting SIM cards for over a decade, now even eSIMs are cheap enough for casual use.
kstrauser
a day ago
I can’t put a SIM in my ereader or Switch or iPad.
lostlogin
a day ago
Changing countries a lot reduces this option a bit.
I’m sure I could find a good all Europe card, but I need my number for work calls.
cycomanic
a day ago
In Europe you have free roaming so it (almost?) never makes sense to get a new sim per country.
systemtest
21 hours ago
You have roaming but sometimes it’s less data than at home. And you can’t use it for months on end. I have multiple sims from various EU countries. When I visit I top up.
deanc
a day ago
To be clear. Within the EU. Not Europe.
normie3000
a day ago
EEA, not EU. I had to check as I thought UK was also included. Seems like they left?
vidarh
19 hours ago
UK is not included, but most UK mobile networks have chosen to pretend the UK hasn't to their customers, and offer similar amounts of voice and data in the EEA, so it still mostly works "one way".
renewiltord
21 hours ago
Convenient to connect all devices to one WiFi. E.g. baby camera is on same WiFi as laptop etc.
forinti
15 hours ago
I really like my GLi microrouter.
https://www.gl-inet.com/products/gl-usb150/
I bought it for my vacations, so I wouldn't have to configure my kid's gadgets, but it is really useful as a wifi adaptor too.
And you can run it from a powerbank.
hnburnsy
a day ago
Have you tried hooking it up to an Ethernet port in a hotel room like the one that the TV uses?
avidiax
a day ago
This rarely works. The TV network is usually access controlled, so you either won't get an IP or you simply won't have internet access.
Some hotel rooms (particularly older business hotels) will have an ethernet port for the guest. These work maybe 50% of the time these days. Sometimes you can find a Ruckus AP in your room at outlet level, and these usually have several ethernet ports on the bottom. These also have a working port around 30% of the time.
So, TL;DR: various ethernet ports in hotel rooms work less than half the time these days.
fastcall
a day ago
How’s that access control handled? Very easy to spoof the MAC of the TV or setup some SNI spoofing proxy server, NGFWs with TLS Active Probing are probably harder to deal with but do hotels really have that?
SomeUserName432
a day ago
> Very easy to spoof the MAC of the TV or setup some SNI spoofing proxy server
At that point you're in the 0.1% that the hotel does not really need to worry about. The other >99% will still need to pay for wifi.
danw1979
21 hours ago
it’s probably >0.1% here …
hnburnsy
15 hours ago
I've read the GL.inet can easily clone the TV Mac, pretty cool.
shibapuppie
14 hours ago
That won't help you if they use 802.1X.
kstrauser
13 hours ago
I’ve never seen that in a motel. It’s a lot of extra network expense to cover something very few people would ever think about.
wateralien
20 hours ago
I've had success hooking it up to some Ethernet cables in hotels, but it's 50/50.
password4321
a day ago
I could never figure out which gl-inet to get, since some of the newer products seemed less powerful than older ones depending on the product family or something...
TeMPOraL
21 hours ago
> some of the newer products seemed less powerful than older ones
Cynic in me thinks it's because they don't want you to buy one product and be set for a decade, like HN-er here: https://news.ycombinator.com/item?id=46373387. Older products might've been too good.
torginus
a day ago
Not sure if you're talking in the context of travel routers, but if you're not, the Flint 2 is always a solid pick.
wateralien
20 hours ago
I think the GL-X3000 could be the daddy for power users and any eventuality: https://www.gl-inet.com/products/gl-x3000/
hk1337
15 hours ago
I was thinking of using that in combination with Beelink ME Mini N150 with proxmox installed on it and host different net tools, git, etc that’s available on the go. I might be overthinking the setup
copperx
21 hours ago
Do you mind expounding on how it has saved you? I'd love to know the practical use cases.
wateralien
20 hours ago
While on a scuba diving trip in Thailand a couple months ago we could position the router slightly outside our hotel room to be able to be able to strongly connect to the very dodgy hotel wifi so my girlfriend could do her work calls.
It would also automatically log into the captive wifi which seemed to require a login every hour or so.
Another time we Ethernet into it using the cable in another hotel to bypass some ridiculous speed limitations on their access point.
I'm considering getting their model which can take SIM cards, so that we can also failover to mobile networks wherever we are.
dwardu
9 hours ago
Is there a 5g dongle I can connect to it? I’ve been searching to no avail
RyJones
10 hours ago
I carry my GL.iNet GL-E750V2 all over the world.
theoreticalmal
a day ago
What is the benefit of this over, for example, an iPhone hotspot?
neither_color
a day ago
Run one wireguard server in your home and one client instance on this router and now all of your devices can share the same residential VPN connection. No fraud blocks or extra verifications from your banking apps, no million suspicious login detected from all your social accounts, use your home netflix account, etc. All without your individual devices running a VPN app.
drnick1
a day ago
> Run one wireguard server in your home and one client instance on this router and now all of your devices can share the same residential VPN connection.
You don't need a "travel router" for this. My phone is permanently connected to my server via Wireguard (so that I can access my files from anywhere). Adding another device just requires adding a peer in the server's config file and can be accomplished very quickly. It's not clear what problem the travel router solves, unless perhaps you travel with dozens of devices.
> no million suspicious login detected from all your social accounts,
I can personally do without those.
vidarh
19 hours ago
Your comment explains why we want a travel router. I have a wire guard setup for my servers. I'm entirely comfortable with setting that up.
But I value my time enough that I don't want the hassle of that for the various devices my family uses when I can just preconfigure and plug in a tiny device and not have them depend on me being in the same location all the time.
tstrimple
a day ago
I can accomplish this via one access point instead of configuring wireguard on N*5 family devices.
gradstudent
a day ago
Why do you need to config wireguard on each device? Connect your phone to your vpn and share the wifi. Works on my android. Struggling to see the value proposition for this device.
valzam
a day ago
Do you have a pixel? On Samsung you cannot share WiFi, Hotspot only works with mobile connections. I learners above that this is possible with pixel phones, makes me want to get one...
asymmetric
20 hours ago
Same with iPhone, you can only share mobile connection.
sandmn
21 hours ago
Does it require specific VPN apps or root? I tried connecting laptop to phone hotspot and even though phone was connected to VPN, laptop wasn't.
adammarples
17 hours ago
So now your phone is a hot spot for your family and you can't leave the hotel room or go 2 hours without charging it?
cheeze
a day ago
> Adding another device just requires adding a peer in the server's config file and can be accomplished very quickly
Do you need a client to be running on each device?
Even regardless "I just need to edit a config file real quick" is... Way more work than I want to do. Works for someone on hn but I'm imagining trying to show my dad how to do that.
That's the benefit of a travel router.
WillPostForFood
a day ago
An iPhone can't bridge a wifi network. So you need something like a travel router to share a wifi connection.
rtkwe
a day ago
They're suggesting just running off your data plan which works for domestic travel (at least to urban areas with good cell service) and can work for international if you go through getting a data eSim.
davedigerati
a day ago
chromecast - godsend on long hotel stays. need to dial in through my home (wireguard) so no license issues with streamers and once I connect my GL.iNet GL-MT300N-V2 to hotel wifi instant bubble of safe wifi for all my devices! weighs nothing, been using for 8 years rock solid.
WhyNotHugo
21 hours ago
If you’re using a VPN: iPhone won’t route hotspot clients over the VPN, so you need to set up VPN on all clients.
trelane
a day ago
You can control it from the ground up, including installing alternate firmware. You can also use VPNs etc.
renewiltord
21 hours ago
Husband can go pick up food order and baby cam still accessible from wife’s phone.
upcoming-sesame
a day ago
How do you handle captive portals in hotels ?
jtokoph
a day ago
Usually you connect your laptop/phone to the portable router network, which then just pulls up the captive portal. Once you auth from one device, any device behind the router is authed with the portal. This is because the hotel network just sees your router's IP/MAC.
mmerickel
a day ago
Connect on your phone or other device. Connect to travel router. Clone the mac address of your device. Connect router to wifi. Adjust device to not auto login. Good to go.
figmert
a day ago
GL.iNet routers don't even need this. It has an option to pass through captive portals. So you connect to your GL.iNet AP, then you set it up for the hotel WiFi, tick the option for passing through (it essentially disables VPN, AdGuard Home and other things if enabled), it will then link you to the captive portal where you can log in as you would otherwise.
Once the internet is active, the GL.iNet router will then re-enable things like VPN and AdGuard Home.
Since these devices are OpenWrt underneath with a pretier ui, I presume this is all possible on any OpenWrt device.
dalanmiller
a day ago
Is this an annoying amount of steps? And do you have to do this on every expiry of your session on the portal?
hshdhdhj4444
a day ago
What advantage does this have over the cheaper UniFi router in the OP?
threatofrain
a day ago
The Beryl AX is going for cheaper ($70) on Amazon right now vs the UniFi Travel Router ($80). Better bang for the buck on both hardware and software without needing specific Ubiquiti anything.
SturgeonsLaw
a day ago
The UniFi router depends on you already having a UniFi environment. If you do, it's a good option, but the GL would work with any heterogeneous network
hshdhdhj4444
a day ago
Thanks! Thats helpful.
fragmede
a day ago
It's available right now, for one.
ei8ths
a day ago
these are awesome, i just take my old wifi router tp-link, its big though. I might have to get one of these little guys.
matt-attack
a day ago
What’s the use case exactly?
raw_anon_1111
a day ago
I have this.
TP-Link AC750
When you are some place with a captive network and want to use devices that don’t have a browser. You connect the router to the WiFi network that has internet access and you connect the other WiFi network to a device with a browser like your phone. Every device looks like one device to the captive network and you can use them all.
Second use case, I now live in a place with a shared internet access that is shared between all of the units. Anyone can broadcast to and control our Roku device and there is no way to block it from the Roku.
We create a private network with the router
tstrimple
a day ago
One is actually usable wifi at hotels with ethernet cables available. I don't use that device, but a DIY version that also acts as a portable media server while traveling. We can tunnel back to our home network, but often stay places with very bad reception and or internet access. Also helps keep the kids entertained on longer road trips. They can connect their devices to the router as we travel and have full access to the cached media.
te_chris
a day ago
Yes these are the way. Use them to get cheap anker security cams to work as baby monitors while we’re in hotel rooms
tomjen3
19 hours ago
I am apparently dumb. What benefit does this give you, other than a segregated network? Do us hotels typically have exposed Ethernet ports?
eliseumds
19 hours ago
I always travel with my GL.iNet GL-MT3000 (Beryl AX) and this is what I use it for:
- My wife and I travel with multiple devices (laptops, phones, Chromecast...) and when we get to a hotel/Airbnb, I simply connect my Beryl AX to their network (it deals with captive portals btw) and all of our devices automatically connect.
- I changed the `/etc/hosts` directly in the router, meaning I can test my local servers under custom domains easily on my other devices like phones/tablets without apps like SquidMan.
- I route specific domains through specific VPNs. Government websites, streaming websites, AWS services, etc.
- I can plug in a 4G USB modem into it and it can automatically fallback to it if the main connection drops.
- It has built-in Tailscale support.