I have a Linux VPS that forwards all incoming traffic on a certain port to a Tailscale IP using firewalld. This allows me to expose a port on my homeserver using the public IP of the Linux VPS.
This is working fine, but the only problem is that my homeserver sees the Tailscale IP as the source address, instead of the original IP. It would be nice to be able to see the “real” ip addresses of the connections.
According to this article ( Mos's blog: Forward Traffic from Public IP to Wireguard client behind NAT and Preserve IP i) it is possible to do this with Wireguard and IPtables. So im interested how to do this with Tailscale+Firewalld instead.