xevio.org // Network Map

// configured: 2026-03-04 — stremio tunnel setup

// device inventory
Device Location IPs Role Software
Desktop (XESKTOP) Apartment
LAN 192.168.8.52
ZeroTier 192.168.193.200
Exit Node / WireGuard Server WireGuard ZeroTier Tailscale
GL.iNet Opal Apartment
WAN 10.66.28.40
LAN 192.168.8.1
WG 10.0.0.2
WireGuard Client / Router WireGuard Client GL.iNet DDNS
XPS Laptop Campus / Mobile
Campus 10.103.92.18
ZeroTier 192.168.193.127
Client ZeroTier Tailscale
// tunnel scenarios
✓ Active — UNCC Campus

Tailscale Exit Node

XPS eduroam/NinerWifi
Tailscale DERP (port 443)
Desktop Internet
Use when: On UNCC or any strict university/corporate network. Tailscale uses port 443 (HTTPS) which cannot be blocked. Desktop must be awake with Tailscale running as exit node.
✓ Active — Open Networks

WireGuard via Opal

Any device on Opal WiFi
Opal WireGuard tunnel
Desktop 192.168.8.52:51820 Internet
Use when: On coffee shop, hotel, or any network where UDP isn't blocked. Faster than Tailscale. Any device on Opal WiFi is automatically tunneled — no software needed on client.
✗ Blocked — UNCC

ZeroTier Exit Node (blocked on campus)

XPS ZeroTier UDP 9993 BLOCKED by UNCC firewall Desktop 192.168.193.200
UNCC blocks UDP 9993 so ZeroTier peers show as RELAY with -1 latency and can't pass traffic. Works fine on open networks.
// what we built
01
Diagnosed the problem
UNCC's eduroam/NinerWifi blocks BitTorrent traffic causing Stremio/Torrentio buffering. Opal is behind building NAT (10.66.28.40) so can't act as WireGuard server.
02
WireGuard Server on Desktop
Configured desktop as WireGuard server listening on 192.168.8.52:51820. Opal SSHed in and configured as WireGuard client connecting to desktop. Tunnel handshake confirmed working.
03
Opal WireGuard Persistence
Config saved to /etc/wireguard/wgclient.conf and startup commands added to /etc/rc.local so tunnel survives reboots.
04
ZeroTier Exit Node (open networks)
Desktop set as ZeroTier exit node via allowDefault=1. NAT configured with New-NetNat covering 10.0.0.0/8. IP forwarding enabled via registry. Works on non-UNCC networks.
05
Tailscale Exit Node (UNCC campus)
Desktop advertised as Tailscale exit node via tailscale up --advertise-exit-node and approved in Tailscale admin. XPS selects desktop as exit node. Uses port 443 — bypasses UNCC firewall completely.
// daily campus workflow
STEP 1
Wake desktop via Alexa
STEP 2
Tailscale running on desktop
STEP 3
XPS: select exit node in Tailscale
DONE
Open Stremio 🍿