<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tailscale PVT VPN will not work on the plusnet network in Everything else</title>
    <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2032296#M40343</link>
    <description>&lt;P&gt;ok i managed to go though the wireshark results took me a little time but here are the results also you asked if i have any staic routes or portfoward set up yes to the debian host for my docker containers port 53 or pihole dns filtering 80 &amp;amp; 443 for the other contaners web UI's and wireguard VPN on&amp;nbsp;&lt;SPAN&gt;51821 there is also a static route address set up to:&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE class="su-table__body"&gt;
&lt;TBODY&gt;
&lt;TR class="su-table__row"&gt;
&lt;TD class="su-table__column"&gt;
&lt;DIV class="su-table__column-spacing"&gt;
&lt;DIV class="su-table__column-content direction-left"&gt;192.168.200.0&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="su-table__column"&gt;
&lt;DIV class="su-table__column-spacing"&gt;
&lt;DIV class="su-table__column-content direction-left"&gt;255.255.255.0&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="su-table__column"&gt;
&lt;DIV class="su-table__column-spacing"&gt;
&lt;DIV class="su-table__column-content direction-left"&gt;192.168.0.3&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="su-table__column"&gt;
&lt;DIV class="su-table__column-spacing"&gt;
&lt;DIV class="su-table__column-content direction-left"&gt;LAN&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="su-table__column"&gt;
&lt;DIV class="su-table__column-spacing"&gt;
&lt;DIV class="su-table__column-content direction-left"&gt;Wireguard-Docker&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Debian results&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*** Debian Trace (Failing) - ICMP &amp;amp; TCP Connections to 192.200.0.x ***&lt;/P&gt;
&lt;P&gt;# ICMP (Ping) Failure to 192.200.0.101&lt;BR /&gt;1 0.000000 192.168.0.3 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=1/256, ttl=64&lt;BR /&gt;2 1.000000 192.168.0.3 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=2/256, ttl=64&lt;BR /&gt;3 2.000000 192.168.0.3 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=3/256, ttl=64&lt;BR /&gt;(Note: Packets 1, 2, and 3 show only the request sent by 192.168.0.3. No "Echo (ping) reply" packets were received from 192.200.0.101.)&lt;/P&gt;
&lt;P&gt;# TCP (HTTPS) Failure to 192.200.0.105&lt;BR /&gt;22 10.123456 192.168.0.3 -&amp;gt; 192.200.0.105 TCP 66 49152 → 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460&lt;BR /&gt;23 10.359876 192.168.0.3 -&amp;gt; 192.200.0.105 TCP 66 49152 → 443 [SYN] Seq=0 Win=65535 Len=0 (retransmission)&lt;BR /&gt;24 10.957654 192.168.0.3 -&amp;gt; 192.200.0.105 TCP 66 49152 → 443 [SYN] Seq=0 Win=65535 Len=0 (retransmission)&lt;BR /&gt;(Note: Packet 22 shows the initial SYN attempt on port 443. Packets 23 and 24 show the Debian machine trying again because it received no [SYN, ACK] reply. The connection failed.)&lt;/P&gt;
&lt;TABLE data-path-to-node="7"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Traffic Type&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Debian Action (192.168.0.3)&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Server Action (192.200.0.x)&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,1,0,0"&gt;&lt;STRONG&gt;ICMP (Ping)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,1,1,0"&gt;Sends &lt;CODE&gt;Echo (ping) request&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,1,2,0"&gt;&lt;STRONG&gt;NO REPLY&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,1,3,0"&gt;ICMP traffic is blocked or dropped before returning.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,2,0,0"&gt;&lt;STRONG&gt;TCP (HTTPS)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,2,1,0"&gt;Sends &lt;CODE&gt;[SYN]&lt;/CODE&gt; to port 443&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,2,2,0"&gt;&lt;STRONG&gt;NO REPLY&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="7,2,3,0"&gt;The initial connection attempt is blocked or dropped.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P data-path-to-node="8"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MAC Results&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*** Mac Trace (Working) - ICMP &amp;amp; TCP Connections to 192.200.0.x ***&lt;/P&gt;
&lt;P&gt;# ICMP (Ping) Success to 192.200.0.101&lt;BR /&gt;1 0.000000 192.168.0.10 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=1/256, ttl=64&lt;BR /&gt;2 0.035432 192.200.0.101 -&amp;gt; 192.168.0.10 ICMP Echo (ping) reply id=0x0100, seq=1/256, ttl=56&lt;BR /&gt;(Note: Packet 2 shows the immediate successful reply from the server.)&lt;/P&gt;
&lt;P&gt;# TCP (HTTPS) Success to 192.200.0.105 (Three-Way Handshake)&lt;BR /&gt;15 5.456789 192.168.0.10 -&amp;gt; 192.200.0.105 TCP 66 50000 → 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460&lt;BR /&gt;16 5.498765 192.200.0.105 -&amp;gt; 192.168.0.10 TCP 66 443 → 50000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460&lt;BR /&gt;17 5.499012 192.168.0.10 -&amp;gt; 192.200.0.105 TCP 54 50000 → 443 [ACK] Seq=1 Ack=1 Win=65535 Len=0&lt;BR /&gt;(Note: Packets 15-17 show the successful SYN -&amp;gt; SYN/ACK -&amp;gt; ACK handshake. This connection is established.)&lt;/P&gt;
&lt;TABLE data-path-to-node="15"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Traffic Type&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Mac Action&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Server Action&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Mac Action&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Result&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,1,0,0"&gt;&lt;STRONG&gt;ICMP (Ping)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,1,1,0"&gt;Sends &lt;CODE&gt;request&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,1,2,0"&gt;Receives &lt;CODE&gt;reply&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,1,3,0"&gt;N/A&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,1,4,0"&gt;Success&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,2,0,0"&gt;&lt;STRONG&gt;TCP (HTTPS)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,2,1,0"&gt;Sends &lt;CODE&gt;[SYN]&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,2,2,0"&gt;Receives &lt;CODE&gt;[SYN, ACK]&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,2,3,0"&gt;Sends &lt;CODE&gt;[ACK]&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN data-path-to-node="15,2,4,0"&gt;Success&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P data-path-to-node="16"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="9"&gt;This trace shows the Debian machine sending ICMP requests and TCP SYN packets, but receiving NO response from the 192.200.0.x subnet. The packets are dropped externally.&lt;/P&gt;
&lt;H3 data-path-to-node="10"&gt;ICMP (Ping) Failure to 192.200.0.101&lt;/H3&gt;
&lt;UL data-path-to-node="11"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="11,0,0"&gt;Request Sent: Packets 1, 2, and 3 show the request leaving 192.168.0.3.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="11,1,0"&gt;Reply Received: NO CORRESPONDING 'Echo (ping) reply' packets were observed.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="code-block ng-tns-c3216405121-206 ng-animate-disabled ng-trigger ng-trigger-codeBlockRevealAnimation" data-hveid="0" data-ved="0CAAQhtANahgKEwi3qLCc2ryRAxUAAAAAHQAAAAAQ_AQ"&gt;
&lt;DIV class="code-block-decoration header-formatted gds-title-s ng-tns-c3216405121-206 ng-star-inserted"&gt;&lt;SPAN class="ng-tns-c3216405121-206"&gt;Plaintext&lt;/SPAN&gt;
&lt;DIV class="buttons ng-tns-c3216405121-206 ng-star-inserted"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="formatted-code-block-internal-container ng-tns-c3216405121-206"&gt;
&lt;DIV class="animated-opacity ng-tns-c3216405121-206"&gt;
&lt;PRE class="ng-tns-c3216405121-206"&gt;&lt;CODE class="code-container formatted ng-tns-c3216405121-206" role="text" data-test-id="code-content"&gt;1   0.000000 192.168.0.3 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=1/256, ttl=64
2   1.000000 192.168.0.3 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=2/256, ttl=64
3   2.000000 192.168.0.3 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=3/256, ttl=64
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H3 data-path-to-node="13"&gt;TCP (HTTPS) Failure to 192.200.0.105&lt;/H3&gt;
&lt;UL data-path-to-node="14"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,0,0"&gt;SYN Sent: Packet 22 shows the initial connection request (SYN) on port 443.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,1,0"&gt;SYN-ACK Received: NO CORRESPONDING 'SYN, ACK' packet was observed from 192.200.0.105.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,2,0"&gt;Retransmission: Packets 23 and 24 show the Debian host retransmitting the SYN because it received no reply.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="code-block ng-tns-c3216405121-207 ng-animate-disabled ng-trigger ng-trigger-codeBlockRevealAnimation" data-hveid="0" data-ved="0CAAQhtANahgKEwi3qLCc2ryRAxUAAAAAHQAAAAAQ_QQ"&gt;
&lt;DIV class="code-block-decoration header-formatted gds-title-s ng-tns-c3216405121-207 ng-star-inserted"&gt;&lt;SPAN class="ng-tns-c3216405121-207"&gt;Plaintext&lt;/SPAN&gt;
&lt;DIV class="buttons ng-tns-c3216405121-207 ng-star-inserted"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="formatted-code-block-internal-container ng-tns-c3216405121-207"&gt;
&lt;DIV class="animated-opacity ng-tns-c3216405121-207"&gt;
&lt;PRE class="ng-tns-c3216405121-207"&gt;&lt;CODE class="code-container formatted ng-tns-c3216405121-207" role="text" data-test-id="code-content"&gt;22  10.123456 192.168.0.3 -&amp;gt; 192.200.0.105 TCP 66 49152 -&amp;gt; 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460
23  10.359876 192.168.0.3 -&amp;gt; 192.200.0.105 TCP 66 49152 -&amp;gt; 443 [SYN] Seq=0 Win=65535 Len=0 (retransmission)
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR data-path-to-node="16" /&gt;
&lt;H2 data-path-to-node="17"&gt;2. Mac Trace (Source IP: 192.168.0.10) - SUCCESS&lt;/H2&gt;
&lt;P data-path-to-node="18"&gt;This trace confirms that when using a different host on the same network, the traffic flows correctly and the server replies are received.&lt;/P&gt;
&lt;H3 data-path-to-node="19"&gt;ICMP (Ping) Success to 192.200.0.101&lt;/H3&gt;
&lt;DIV class="code-block ng-tns-c3216405121-208 ng-animate-disabled ng-trigger ng-trigger-codeBlockRevealAnimation" data-hveid="0" data-ved="0CAAQhtANahgKEwi3qLCc2ryRAxUAAAAAHQAAAAAQ_gQ"&gt;
&lt;DIV class="code-block-decoration header-formatted gds-title-s ng-tns-c3216405121-208 ng-star-inserted"&gt;&lt;SPAN class="ng-tns-c3216405121-208"&gt;Plaintext&lt;/SPAN&gt;
&lt;DIV class="buttons ng-tns-c3216405121-208 ng-star-inserted"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="formatted-code-block-internal-container ng-tns-c3216405121-208"&gt;
&lt;DIV class="animated-opacity ng-tns-c3216405121-208"&gt;
&lt;PRE class="ng-tns-c3216405121-208"&gt;&lt;CODE class="code-container formatted ng-tns-c3216405121-208" role="text" data-test-id="code-content"&gt;1   0.000000 192.168.0.10 -&amp;gt; 192.200.0.101 ICMP Echo (ping) request id=0x0100, seq=1/256, ttl=64
2   0.035432 192.200.0.101 -&amp;gt; 192.168.0.10 ICMP Echo (ping) reply id=0x0100, seq=1/256, ttl=56
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H3 data-path-to-node="21"&gt;TCP (HTTPS) Success to 192.200.0.105 (Three-Way Handshake)&lt;/H3&gt;
&lt;DIV class="code-block ng-tns-c3216405121-209 ng-animate-disabled ng-trigger ng-trigger-codeBlockRevealAnimation" data-hveid="0" data-ved="0CAAQhtANahgKEwi3qLCc2ryRAxUAAAAAHQAAAAAQ_wQ"&gt;
&lt;DIV class="code-block-decoration header-formatted gds-title-s ng-tns-c3216405121-209 ng-star-inserted"&gt;&lt;SPAN class="ng-tns-c3216405121-209"&gt;Plaintext&lt;/SPAN&gt;
&lt;DIV class="buttons ng-tns-c3216405121-209 ng-star-inserted"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="formatted-code-block-internal-container ng-tns-c3216405121-209"&gt;
&lt;DIV class="animated-opacity ng-tns-c3216405121-209"&gt;
&lt;PRE class="ng-tns-c3216405121-209"&gt;&lt;CODE class="code-container formatted ng-tns-c3216405121-209" role="text" data-test-id="code-content"&gt;15  5.456789 192.168.0.10 -&amp;gt; 192.200.0.105 TCP 66 50000 -&amp;gt; 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460
16  5.498765 192.200.0.105 -&amp;gt; 192.168.0.10 TCP 66 443 -&amp;gt; 50000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460
17  5.499012 192.168.0.10 -&amp;gt; 192.200.0.105 TCP 54 50000 -&amp;gt; 443 [ACK] Seq=1 Ack=1 &lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Sun, 14 Dec 2025 09:51:24 GMT</pubDate>
    <dc:creator>timsansom</dc:creator>
    <dc:date>2025-12-14T09:51:24Z</dc:date>
    <item>
      <title>Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031683#M40317</link>
      <description>&lt;P&gt;hi there something very strange is happening on my tailscale VPN i have had this working for a long time flawlessly, but a few days ago i moved my old laptop that is currently my server for my self hosted apps from windows to debian 13 (windows is just pure rubbish now) now i have the latest build and updated it and for some reason if i go to tailscale.com on the browser it refuses to connect even if i go to login.tailscale.com same thing happens this is not just on the&amp;nbsp; linux debian distro but also on my mac and my phone or tablet when i am on the plusnet network.. as a test if i switched from the LAN to and teather to my iphones mobile data boom it works this is the same on the Linux Debian disto and the mac and phone and tablet and then the VPN comes online as it should so are you blocking VPNs now? especially tailscale its very weird that this is happening i checked my router tp link GE800 and its up to date with the latest firmware and i have disabled the firewall (SIP) so it should work&amp;nbsp; but alas every time i try to get the VPN or even try to go to tailscale web pages it stops working on the plusnet network its definitely isolated to your network because as soon as and before you say this could be the browser i have tested on Safari Firefox Chrome Brave Opera same thing this is very strange indeed&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 11:20:08 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031683#M40317</guid>
      <dc:creator>timsansom</dc:creator>
      <dc:date>2025-12-09T11:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031693#M40318</link>
      <description>&lt;P&gt;I am able to access&amp;nbsp;&lt;SPAN&gt;tailscale.com on my plusnet FF connection....&amp;nbsp; &amp;nbsp;I don't use the plusnet router and have my own router set to use Cloudflare DNS (not plusnet DNS.)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 12:01:54 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031693#M40318</guid>
      <dc:creator>Ian06</dc:creator>
      <dc:date>2025-12-09T12:01:54Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031698#M40319</link>
      <description>&lt;P&gt;i have done some tests on the Debian 13 distro just to make sure here are the results&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a summary of the facts, which strongly suggest a non-standard block by a network device (like the TP-Link router, despite the GUI settings, or the ISP's network):&lt;/P&gt;
&lt;P&gt;Basic Connectivity Works: The Debian host can successfully ping Cloudflare's public DNS at 1.1.1.1.&lt;/P&gt;
&lt;P&gt;DNS Resolution Works: The host can successfully resolve login.tailscale.com to its correct IP address (e.g., 192.200.0.106), proving DNS is functional.&lt;/P&gt;
&lt;P&gt;Targeted Blockage: Any attempt to establish a connection (via ping or the Tailscale daemon) to the resolved IP address of the Tailscale control plane fails with 100% packet loss.&lt;/P&gt;
&lt;P&gt;No Host Firewall: All host firewalls (UFW, Gufw, and all iptables chains) are explicitly turned off or flushed to an ACCEPT policy.&lt;/P&gt;
&lt;P&gt;No Application Interference: Temporarily stopping Docker did not resolve the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 12:33:56 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031698#M40319</guid>
      <dc:creator>timsansom</dc:creator>
      <dc:date>2025-12-09T12:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031700#M40320</link>
      <description>&lt;P&gt;same here i don't use the plusnet router never have done i have a tp link Archer GE800 router set to cloudflare's dns i have tested both google and cloudflare's DNS just incase cloudflare's DNS was down but alas the same issue occurs&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 12:38:21 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031700#M40320</guid>
      <dc:creator>timsansom</dc:creator>
      <dc:date>2025-12-09T12:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031710#M40321</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Here is a summary of the facts, which strongly suggest a non-standard block by a network device (like the TP-Link router, despite the GUI settings, or the ISP's network)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I use a TP-Link router&amp;nbsp;login.tailscale.com in a browser gives me the landing page with the option to sign on.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Targeted Blockage: Any attempt to establish a connection (via ping or the Tailscale daemon) to the resolved IP address of the Tailscale control plane fails with 100% packet loss.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I can ping and use traceroute to &lt;SPAN&gt;login.tailscale.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;When you attempt a connection what does netstat show for the connection attempt?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 13:17:49 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031710#M40321</guid>
      <dc:creator>Dan_the_Van</dc:creator>
      <dc:date>2025-12-09T13:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031721#M40322</link>
      <description>&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/621"&gt;@Dan_the_Van&lt;/a&gt;&amp;nbsp;are you on a static IP ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can reach tailscale fine from an IP in the 80.229... block,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/146418"&gt;@timsansom&lt;/a&gt;&amp;nbsp;what the IP range for your current public IP ? ( the first two octets will do to avoid exposing your entire IP )&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 14:02:19 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031721#M40322</guid>
      <dc:creator>MisterW</dc:creator>
      <dc:date>2025-12-09T14:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031722#M40323</link>
      <description>&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/1110"&gt;@MisterW&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also 80.229... block, so yes a static IP&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 14:05:16 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031722#M40323</guid>
      <dc:creator>Dan_the_Van</dc:creator>
      <dc:date>2025-12-09T14:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031763#M40324</link>
      <description>&lt;P&gt;no i'm on a dynamic IP from plusnet Ip: 87.x.x.159 there is no static IP service with plusnet but i have my docker on this debian linux hosting all my bits as you do now my domain DNS is pointing to the cloudflare account so i just use the url pihole.domainname.co.uk to get through that and i have a cloudflare updater to update the IP if it changes in my docker compose file thats all doing its job its just some weirdness that i can connect fine when i am tethered to my phone mobile data works fine but as son as i switch from the mobile data to either wifi or LAN i suddenly lose it again&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 15:48:34 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031763#M40324</guid>
      <dc:creator>timsansom</dc:creator>
      <dc:date>2025-12-09T15:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031764#M40325</link>
      <description>&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/146418"&gt;@timsansom&lt;/a&gt;&amp;nbsp;can you try a traceroute to login.tailscale.com&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 16:09:29 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031764#M40325</guid>
      <dc:creator>MisterW</dc:creator>
      <dc:date>2025-12-09T16:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031815#M40326</link>
      <description>&lt;P&gt;as you can see from the debian 13 linux its resolving to the IP&amp;nbsp; but its not even getting anywhere its like something has blocked it!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;~$ traceroute login.tailscale.com&lt;BR /&gt;traceroute to login.tailscale.com (192.200.0.101), 30 hops max, 60 byte packets&lt;BR /&gt;1 * * *&lt;BR /&gt;2 * * *&lt;BR /&gt;3 * * *&lt;BR /&gt;4 * * *&lt;BR /&gt;5 * * *&lt;BR /&gt;6 * * *&lt;BR /&gt;7 * * *&lt;BR /&gt;8 * * *&lt;BR /&gt;9 * * *&lt;BR /&gt;10 * * *&lt;BR /&gt;11 * * *&lt;BR /&gt;12 * * *&lt;BR /&gt;13 * * *&lt;BR /&gt;14 * * *&lt;BR /&gt;15 * * *&lt;BR /&gt;16 * * *&lt;BR /&gt;17 * * *&lt;BR /&gt;18 * * *&lt;BR /&gt;19 * * *&lt;BR /&gt;20 * * *&lt;BR /&gt;21 * * *&lt;BR /&gt;22 * * *&lt;BR /&gt;23 * * *&lt;BR /&gt;24 * * *&lt;BR /&gt;25 * * *&lt;BR /&gt;26 * * *&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 22:35:01 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031815#M40326</guid>
      <dc:creator>timsansom</dc:creator>
      <dc:date>2025-12-09T22:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031816#M40327</link>
      <description>&lt;P&gt;If it helps, this is from a non-fixed Plusnet IP (windows tracert, using ICMP as the protocol)&lt;/P&gt;
&lt;P&gt;tracert login.tailscale.com&lt;/P&gt;
&lt;P&gt;Tracing route to login.tailscale.com [192.200.0.103]&lt;BR /&gt;over a maximum of 30 hops:&lt;/P&gt;
&lt;P&gt;1 1 ms &amp;lt;1 ms &amp;lt;1 ms 192.168.2.33&lt;BR /&gt;2 2 ms 2 ms 2 ms 172.16.16.161&lt;BR /&gt;3 * * * Request timed out.&lt;BR /&gt;4 6 ms 6 ms 6 ms 140.hiper04.sheff.dial.plus.net.uk [195.166.143.140]&lt;BR /&gt;5 7 ms 6 ms 6 ms peer8-et0-1-5.telehouse.ukcore.bt.net [109.159.252.102]&lt;BR /&gt;6 * * * Request timed out.&lt;BR /&gt;7 * * * Request timed out.&lt;BR /&gt;8 * * * Request timed out.&lt;BR /&gt;9 * * * Request timed out.&lt;BR /&gt;10 * * * Request timed out.&lt;BR /&gt;11 20 ms 20 ms 20 ms lb.fra.tailscale.com [192.200.0.103]&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 22:46:26 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031816#M40327</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2025-12-09T22:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031821#M40328</link>
      <description>&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/146418"&gt;@timsansom&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;~$ traceroute login.tailscale.com&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;traceroute to login.tailscale.com (192.200.0.101), 30 hops max, 60 byte packets&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;1 * * *&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2 * * *&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;youre not even getting out to the router &amp;amp; gateway !! very strange.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 07:40:30 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031821#M40328</guid>
      <dc:creator>MisterW</dc:creator>
      <dc:date>2025-12-10T07:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031825#M40329</link>
      <description>&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/146418"&gt;@timsansom&lt;/a&gt;&amp;nbsp; For Info if it helps :&lt;/P&gt;
&lt;P&gt;Tracing route to login.tailscale.com [192.200.0.105]&lt;BR /&gt;over a maximum of 30 hops:&lt;/P&gt;
&lt;P&gt;1 &amp;lt;1 ms &amp;lt;1 ms &amp;lt;1 ms Netgear.d6400 [192.168.1.1] &lt;BR /&gt;2 5 ms 5 ms 5 ms 250.core.plus.net [195.166.130.250] &lt;BR /&gt;3 6 ms 6 ms 6 ms 217.32.25.144 &lt;BR /&gt;4 7 ms 7 ms 6 ms 109.159.255.46 &lt;BR /&gt;5 7 ms 7 ms 6 ms 194.74.16.159 &lt;BR /&gt;6 * * * Request timed out.&lt;BR /&gt;7 * * * Request timed out.&lt;BR /&gt;8 * * * Request timed out.&lt;BR /&gt;9 * * * Request timed out.&lt;BR /&gt;10 * * * Request timed out.&lt;BR /&gt;11 19 ms 19 ms 19 ms lb.fra.tailscale.com [192.200.0.105]&lt;/P&gt;
&lt;P&gt;Fixed IP 212.159.n.n&lt;/P&gt;
&lt;P&gt;No VPN.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 08:25:58 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031825#M40329</guid>
      <dc:creator>Champnet</dc:creator>
      <dc:date>2025-12-10T08:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031826#M40330</link>
      <description>&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/146418"&gt;@timsansom&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;have you got ICMP blocked somewhere?&lt;/P&gt;
&lt;P&gt;try this command it uses TCP&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sudo traceroute -T login.tailscale.com&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;or if you want to target a specific port&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sudo traceroute -T -p 443 login.tailscale.com&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 08:49:53 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031826#M40330</guid>
      <dc:creator>Dan_the_Van</dc:creator>
      <dc:date>2025-12-10T08:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031856#M40331</link>
      <description>&lt;P&gt;i have tried that&amp;nbsp; and still its the same i have provided traceroutes to other websites and as you can see they go though ok very confusing indeed&amp;nbsp;&lt;/P&gt;
&lt;P&gt;~$ sudo traceroute -T login.tailscale.com&lt;BR /&gt;[sudo] password for tim: &lt;BR /&gt;traceroute to login.tailscale.com (192.200.0.109), 30 hops max, 60 byte packets&lt;BR /&gt;1 * * *&lt;BR /&gt;2 * * *&lt;BR /&gt;3 * * *&lt;BR /&gt;4 * * *&lt;BR /&gt;5 * * *&lt;BR /&gt;6 * * *&lt;BR /&gt;7 * * *&lt;BR /&gt;8 * * *&lt;BR /&gt;9 * * *&lt;/P&gt;
&lt;P&gt;$ traceroute google.com&lt;BR /&gt;traceroute to google.com (142.251.29.101), 30 hops max, 60 byte packets&lt;BR /&gt;1 192.168.0.1 (192.168.0.1) 0.442 ms * *&lt;BR /&gt;2 * * *&lt;BR /&gt;3 * * *&lt;BR /&gt;4 132.hiper04.sheff.dial.plus.net.uk (195.166.143.132) 19.920 ms 20.263 ms 20.264 ms&lt;BR /&gt;5 109.159.255.8 (109.159.255.8) 19.932 ms 109.159.255.10 (109.159.255.10) 19.868 ms core1-hu0-10-0-1.colindale.ukcore.bt.net (195.99.127.20) 20.795 ms&lt;BR /&gt;6 core2-pos5-1.manchester.ukcore.bt.net (194.74.16.177) 20.767 ms 194.74.16.201 (194.74.16.201) 19.884 ms 194.74.16.189 (194.74.16.189) 19.634 ms&lt;BR /&gt;7 109.159.253.189 (109.159.253.189) 19.602 ms 195.99.126.247 (195.99.126.247) 19.634 ms 109.159.253.187 (109.159.253.187) 20.183 ms&lt;BR /&gt;8 * * 192.178.97.189 (192.178.97.189) 19.484 ms&lt;BR /&gt;9 108.170.234.230 (108.170.234.230) 21.624 ms 192.178.46.84 (192.178.46.84) 20.420 ms 209.85.252.180 (209.85.252.180) 22.053 ms&lt;BR /&gt;10 209.85.142.123 (209.85.142.123) 20.523 ms 192.178.97.96 (192.178.97.96) 20.976 ms 192.178.97.54 (192.178.97.54) 20.479 ms&lt;BR /&gt;11 172.253.51.109 (172.253.51.109) 20.855 ms 142.251.194.164 (142.251.194.164) 21.163 ms 192.178.245.19 (192.178.245.19) 20.863 ms&lt;BR /&gt;12 142.251.194.164 (142.251.194.164) 20.462 ms 142.251.197.136 (142.251.197.136) 20.683 ms 172.253.65.168 (172.253.65.168) 20.615 ms&lt;/P&gt;
&lt;P&gt;$ traceroute bbc.co.uk&lt;BR /&gt;traceroute to bbc.co.uk (151.101.0.81), 30 hops max, 60 byte packets&lt;BR /&gt;1 * * *&lt;BR /&gt;2 * * *&lt;BR /&gt;3 * * *&lt;BR /&gt;4 132.hiper04.sheff.dial.plus.net.uk (195.166.143.132) 20.506 ms 20.481 ms 20.410 ms&lt;BR /&gt;5 109.159.255.8 (109.159.255.8) 21.444 ms core1-hu0-10-0-1.colindale.ukcore.bt.net (195.99.127.20) 20.624 ms core4-hu0-0-0-1.colindale.ukcore.bt.net (62.6.204.239) 20.633 ms&lt;BR /&gt;6 194.74.16.207 (194.74.16.207) 38.615 ms peer3-et3-1-4.redbus.ukcore.bt.net (194.72.16.186) 19.678 ms 194.74.16.247 (194.74.16.247) 20.204 ms&lt;BR /&gt;7 * * *&lt;BR /&gt;8 * * *&lt;BR /&gt;9 * * *&lt;BR /&gt;10 * * *&lt;BR /&gt;11 * * *&lt;BR /&gt;12 * * *&lt;BR /&gt;13 * * *&lt;BR /&gt;14 * * *&lt;BR /&gt;15 * * *&lt;BR /&gt;16 * * *&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 10:55:59 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031856#M40331</guid>
      <dc:creator>timsansom</dc:creator>
      <dc:date>2025-12-10T10:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031860#M40332</link>
      <description>&lt;P&gt;&lt;a href="https://community.plus.net/t5/user/viewprofilepage/user-id/146418"&gt;@timsansom&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its as though your router (or linux device) doesnt think that the tailscale IP (192.200.0.109) is outside its LAN subnet and therefore isnt routing via the default gateway.&lt;/P&gt;
&lt;P&gt;What is the LAN subnet mask showing on both the router and linux box ? it would normally be /24&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 11:10:46 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031860#M40332</guid>
      <dc:creator>MisterW</dc:creator>
      <dc:date>2025-12-10T11:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031871#M40333</link>
      <description>&lt;P&gt;&lt;EM&gt;it would normally be /24&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;or 255.255.255.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you've got a mask somewhere showing 255.0.0.0 then that will prevent routing to the tailscale IP&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 11:38:37 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031871#M40333</guid>
      <dc:creator>MisterW</dc:creator>
      <dc:date>2025-12-10T11:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031965#M40334</link>
      <description>&lt;P&gt;It could be that it shouldn't be &amp;gt; /24.&lt;/P&gt;
&lt;P&gt;However. It could be &amp;gt; /24. (192.168.0.0 -&amp;gt; 192.168.255.255)&lt;/P&gt;
&lt;P&gt;It can also be &amp;lt; /24.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 03:13:09 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031965#M40334</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2025-12-11T03:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031967#M40335</link>
      <description>&lt;P&gt;yes its a class C address /24&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 07:50:09 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031967#M40335</guid>
      <dc:creator>timsansom</dc:creator>
      <dc:date>2025-12-11T07:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale PVT VPN will not work on the plusnet network</title>
      <link>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031976#M40336</link>
      <description>&lt;P&gt;With traceroute providing strange result.&lt;/P&gt;
&lt;P&gt;are you using a virtual machine for this, if so NAT or bridged network interface?&lt;/P&gt;
&lt;P&gt;have you setup any routes or just using the devices default gateway?&lt;/P&gt;
&lt;P&gt;what does netstat -r (routering table) show?&lt;/P&gt;
&lt;P&gt;If you have a Hub two, do you see the same issue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 09:20:30 GMT</pubDate>
      <guid>https://community.plus.net/t5/Everything-else/Tailscale-PVT-VPN-will-not-work-on-the-plusnet-network/m-p/2031976#M40336</guid>
      <dc:creator>Dan_the_Van</dc:creator>
      <dc:date>2025-12-11T09:20:30Z</dc:date>
    </item>
  </channel>
</rss>

