Lhutz
21
Sorry, i probably should have tried traceroute first to not waste your time. Looking at the traceroute output, it was clear that traffic was traversing my tailscale network and making its way to other clients via that route, which is not surprising since my router is a subnet router for my tailnet. I temporarily turned off the tailscale network connection on my laptop and now everything is behaving as expected. The tailnet is for my use only at the moment and will never be accessible to anyone who wouldn't be allowed on the management network anyway, so this is fine.
Just one more question for you:
If I wanted to, say, route some traffic between vlan1 and vlan10 (let's say i want to allow vlan10 to connect to port 123 on a specific ip, or even port 123 on all clients in vlan1. What would i need to do exactly? I ask this as when I wall off the IoT devices, i do need them to be able to connect to some non-IoT clients on the main/management vlan.