Wireguard, Tailscale and Android Auto (wireless)

Hello,

With the use of Tailscale now being a supported way of circumventing CG-NAT issues, I thought that I would post my experience.

I set up a VPN on my router just to get an idea of how it’s done.

It should be noted that:

  1. I don’t have any issues connecting ARC conventionally with port forwarding.
  2. I used wireguard (supported by my router) rather than Tailscale but I would imagine the result would be the same.

The wireguard VPN was easily configured and I was able to get ARC on my mobile connecting to the Roon Server even when the port forwarding rules on my router were disabled. Thus the Wireguard solution would circumvent a CG-NAT issue in the same way as Tailscale would (as expected).

However, I did find one issue which, again, I would imagine to be common to both Wireguard and Tailscale.

If I left the Wireguard VPN enabled when I got into my car (a 2023 VW), Android Auto did not work because the wireless Android Auto uses a VW wireless hot-spot offered by the car to provide the high data rate connection between the mobile and the car.

I don’t think that this would be an issue with a wired (USB) Android Auto connection.

It may be possible to configure the Wireguard app on my mobile to provide exceptions to the VPN routing but I didn’t look because, to the best of my knowledge, there is no way to obtain the VW hot-spot ip address and subnet info.

There may well be ways around this issue but I thought I would post my experience as a “heads-up”.

2 Likes

I’ve not tried it yet but a solution to this has been posted by @Chuck_Davis at: