Get started
Login
© 2024

Subnet router BGP advertisement

When using high availability subnet routers in network environments using Reverse Path Filtering (RPF), it is necessary to know which subnet router is active and to be used for return traffic. tailscaled can work with a local BIRD daemon to make the active subnet router inject a route to 100.64.0.0/10.

There is a sample BIRD config file and tailscale stanza available.

To configure tailscaled to communicate with a local BIRD process to manage route injection:

  1. Make sure to copy both config files from https://github.com/tailscale/tailscale/tree/main/docs/bird
  2. Update the following BGP (border gateway protocol) settings in the sample_bird.conf file.
    1. AS numbers
    2. Neighbor/Router address
  3. Launch BIRD: sudo bird -c /path/to/sample_bird.conf.
  4. Launch tailscaled with the --bird-socket argument.

In addition to adding arguments to tailscaled, you can create a /etc/default/tailscaled file and add a FLAGS variable:

FLAGS="--bird-socket=/var/run/bird.ctl"

BIRD supports Bidirectional Forwarding Detection, and has more options for BGP than the ones defined in the sample file.

Last updated Sep 4, 2024