TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tailscale 4via6 – Connect Edge Deployments at Scale

118 pointsby tiernano3 days ago

9 comments

jetsnoc3 days ago
We chose Tailscale as our mesh zero-trust platform primarily for its 4via6 subnet routing. Many of our interfacing networks reuse CIDR ranges, and we had no interest in maintaining a custom WireGuard implementation to handle subnet overlaps. The hidden operational cost of bespoke networking solutions is never trivial. Tailscale’s combination of 4via6, fine-grained ACLs, lightweight agents, and a customer-friendly licensing model made it an easy decision for us—especially given their flexibility around node licensing, which erred in favor of the customer and our custom use cases that would have otherwise inflated our COGS.
评论 #43966950 未加载
pmarreck3 days ago
Honest question- Would a full IPv6 implementation across the board, hurt Tailscale&#x27;s M.O. and bottom line, assuming all routing worked properly (a big assumption, to be sure)?<p>You can probably guess the next question, if the answer to that one is anything like a &quot;yes&quot;<p>That said, my experiences with Tailscale have been nothing but positive and I appreciate the work they&#x27;re doing to simplify Internet connectivity between endpoints inside different LANs and WANs
评论 #43967527 未加载
评论 #43968260 未加载
评论 #43969093 未加载
评论 #43969885 未加载
评论 #43968720 未加载
vessenes3 days ago
Wow people don&#x27;t like this in the comments. I like this! This is cool. I think the use case of deploying robots and being able to rely on their IPs for various uses is smart, and interesting. Looking forward to seeing how this evolves.
评论 #43967044 未加载
tptacek3 days ago
Love to see more schemes that put the lie to 128 bit addresses being overkill. We&#x27;ll find ways to run out of them soon enough!<p>(Signed: someone who deployed at scale a scheme that eats 8 octets for two embedded IPv4 addresses, plus an additional 2 octets of signaling).
Sesse__3 days ago
Why do they feel the need to call NAT64 by some new weird “4via6” name?
评论 #43964756 未加载
评论 #43964646 未加载
评论 #43964656 未加载
评论 #43964533 未加载
评论 #43964723 未加载
Arnt3 days ago
Reminds me of the network a friend described. After a couple of mergers and sales, they had so much NAT that one particular cron job tab used an internal server-to-server connection that passed through five NAT instances.<p>And this tailscale product seems to say &quot;this product makes that kind of situation less awful&quot; which I&#x27;m sure is somehow good but I can&#x27;t help thinking that &quot;less awful&quot; is going to mean &quot;still awful&quot; for most deployments.
评论 #43968676 未加载
easterncalculus3 days ago
Not sure why the questions asking about what differentiates this (if anything) from NAT64 are getting flagged in this thread.
karmicthreat3 days ago
Is there a way to translate these into friendlier names? It would be nice if something like lidar-front.robot1.yada-fleet.bar could be made.
lostmsu3 days ago
Or just use Yggdrasil with a firewall.
评论 #43966194 未加载
评论 #43966111 未加载