Subnet router BGP advertisement
When using high availability subnet routers in network environments using Reverse Path Filtering (RPF), it is necessary to know which subnet router is active and to be used for return traffic. tailscaled can work with a local BIRD daemon to make the active subnet router inject a route to 100.64.0.0/10.
There is a sample BIRD config file and tailscale stanza available.
To configure tailscaled to communicate with a local BIRD process to manage route injection:
- Make sure to copy both config files from
https://github.com/tailscale/tailscale/tree/main/docs/bird - Update the following BGP (border gateway protocol) settings in the
sample_bird.conffile.- AS numbers
- Neighbor/Router address
- Launch BIRD:
sudo bird -c /path/to/sample_bird.conf. - Launch
tailscaledwith the--bird-socketargument.
In addition to adding arguments to tailscaled, you can create a /etc/default/tailscaled file and add a FLAGS variable:
FLAGS="--bird-socket=/var/run/bird.ctl"
BIRD supports Bidirectional Forwarding Detection, and has more options for BGP than the ones defined in the sample file.
