Homelab Series Index
Digital freedom: building a personal services ecosystem without depending on big tech.
- Homelab: Necessity or Whim?
- Homelab: Proxmox and LXC Containers
- Homelab: Immich Setup
- Homelab: Navidrome Setup
- Homelab: Secure Remote Access
- Homelab: Migration from iCloud to Immich
- Homelab: AFFiNE Setup
- Homelab: KISS Backup Strategy
- Homelab: Network Migration and Wireguard
- Homelab: UPS and Network UPS Tools
- Homelab: From AFFiNE to Obsidian with Syncthing
Network Scenario Change Link to heading
I moved my homelab mini PC to a different network. This change brings some modifications to the remote access strategy: I will switch from Tailscale to a direct Wireguard connection configured on the router.
The reason is simple: having more direct control over VPN tunnels by managing everything at the router level, eliminating the dependency on an external service for home network access.
Wireguard vs Tailscale: Direct Control Link to heading
Migration to Wireguard configured directly on the router offers some advantages:
- Total control: Configuration managed entirely at home
- Reduced external dependencies: No intermediary cloud service
- Performance: Direct connection without external relays
- Simplicity: A single VPN tunnel to manage
Tailscale remains an excellent solution for more complex scenarios or when configuration simplicity is desired, but for a monolithic homelab, direct management makes sense.
Troubleshooting: Gateway Change Link to heading
The network change required updating gateway addresses on both the Proxmox node and LXC containers.
Proxmox Gateway Correction Link to heading
Temporary Fix Before modifying permanent configurations, always test with temporary changes:
ip route replace default via 192.168.1.1
ping -c3 8.8.8.8
Permanent Fix:
nano /etc/network/interfaces
Update the iface vmbr0 inet static section:
gateway 192.168.1.1
Restart networking:
systemctl restart networking
LXC Container Gateway Correction Link to heading
To quickly update all containers:
Single container method:
# First check the current configuration
pct config 101
# Then update with the complete configuration
pct set 101 --net0 name=eth0,bridge=vmbr0,ip=192.168.1.X/24,gw=192.168.1.254
Automatic batch method:
for i in $(pct list | awk 'NR>1 {print $1}'); do
current_net=$(pct config $i | grep '^net0:' | sed 's/net0: //')
new_net=$(echo $current_net | sed 's/,gw=[^,]*//' | sed 's/$/,gw=192.168.1.254/')
pct set $i --net0 "$new_net"
done
Verify current configuration:
pct config <vmid>
ping 8.8.8.8 from both the Proxmox node and containers.Managing the Transition Link to heading
The migration process was designed to minimize downtime:
- Wireguard configuration on the router while Tailscale was still active
- Complete testing of remote access through Wireguard
- Gateway update across the entire infrastructure
- Tailscale container shutdown (kept as backup)
This strategy ensures operational continuity and allows for immediate rollback in case of problems.
Next Steps Link to heading
With the network migration completed, the homelab is now optimized for:
- Direct remote access through Wireguard
- Centralized VPN tunnel management
- Reduced complexity in network infrastructure
The Tailscale container remains shut down but configured, ready to be reactivated when needed for specific scenarios or as an emergency solution.