Netmaker's answer
Netmaker's answer
Netmaker is faster, more configurable, cheaper, and can be fully-self hosted. With Netmaker, you're in control.
Netmaker's answer
IT admins, sysadmins, DevOps, InfraOps, platform engineers, and developers.
Netmaker's answer
WireGuard, Golang, and Docker.
Based on our record, Netmaker should be more popular than WireGuard. It has been mentiond 63 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
With Netmaker, you can have greater control and customization by assigning dedicated IP addresses to specific nodes within your network. I just stumble upon it yesterday, check it out. Source: almost 2 years ago
These days, I'm trying to deploy full mesh VPN network with netmaker. It is really easy to use and manage. However there are something makes me confused. Source: almost 2 years ago
If a TCP based protocol isn't an absolute must have, I'd ditch OpenVPN for Wireguard with some kind of management overlay. e.g netmaker. Source: about 2 years ago
Do the net maker https://github.com/gravitl/netmaker worth trying to use instead of Tailscale? Tailscale is good, but I can watch YouTube over Wi-Fi in another country, but when I try to use Jellyfin to watch movies it’s not loading well. Source: about 2 years ago
Very relatable! At first, I struggled for days trying to make Netmaker or Innernet functional for my personal home server (Raspberry Pi behind multiple routers). But then I stumbled upon ZeroTier, and everything worked seamlessly within a couple of hours. Tailscale was actually the next one on my list because I heard many positive things about it over at r/selfhosted (especially about headscale). However, I did... Source: about 2 years ago
Wireguard. Wireguard uses UDP only and runs TCP sockets over UDP. Source: about 2 years ago
Look at Wireguard. I know you don't want Yet Another VPN running alongside your IPSec, but it's less VPN and more encrypted point-to-point UDP. You can set it up on any port you wish, including common ports that might be open on an outbound smart firewall not doing deep packet inspection. That way, it can stay out of the way of your existing IPSec deployment. Source: about 2 years ago
We use Elixir/Erlang for our control plane, and Rust for our data plane, built on the excellent WireGuard® tunneling protocol. Source: about 2 years ago
Both products are based off Wireguard which is available for all new linux distributions. https://wireguard.com . I'm not saying OP's solution is wrong, just curious what the advantages are. Other than potentially simpler client setup, what are the advantages of paying for tailscale. With the opensource tailscale, I'm not sure if you get access to an api you can use to look up the hosts. Source: about 2 years ago
Noise Protocol Framework (used by Wireguard). Source: about 2 years ago
TailScale - Private networks made easy Connect all your devices using WireGuard, without the hassle. Tailscale makes it as easy as installing an app and signing in.
OpenVPN - OpenVPN - The Open Source VPN
ZeroTier - Extremely simple P2P Encrypted VPN
ProtonVPN - ProtonVPN is a security focused FREE VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection.
Headscale - An open source, self-hosted implementation of the Tailscale control server
NetBird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and manage access with just a few clicks.