Subnet router BGP advertisement
When using high availability subnet routers in network environments using Reverse Path Filtering (RPF), it is necessary to know which subnet router is active and to be used for return traffic. tailscaled
can work with a local BIRD daemon to make the active subnet router inject a route to 100.64.0.0/10
.
There is a sample BIRD config file and tailscale stanza available.
To configure tailscaled
to communicate with a local BIRD process to manage route injection:
- Make sure to copy both config files from
https://github.com/tailscale/tailscale/tree/main/docs/bird
- Update the following BGP (border gateway protocol) settings in the
sample_bird.conf
file.- AS numbers
- Neighbor/Router address
- Launch BIRD:
sudo bird -c /path/to/sample_bird.conf
. - Launch
tailscaled
with the--bird-socket
argument.
In addition to adding arguments to tailscaled
, you can create a /etc/default/tailscaled
file and add a FLAGS
variable:
FLAGS="--bird-socket=/var/run/bird.ctl"
BIRD supports Bidirectional Forwarding Detection, and has more options for BGP than the ones defined in the sample file.