{
"$type": "site.standard.document",
"content": {
"$type": "site.subgraph.content.markdown",
"body": "\nHotel Wi-Fi is terrible. Captive portals, device limits, privacy concerns.\n\nI tried the GL.iNet Beryl AX on my last trip. My dad had been running the same idea with the Slate AX and recommended it.\n\nSmall router, big difference.\n\n## How it works\n\nThe Beryl AX broadcasts your home SSID. Your devices connect automatically. Behind the scenes, the router talks to the hotel internet and routes everything through a VPN.\n\nThe hardware is tiny, about the size of a deck of cards. USB-C powered, so any phone charger or power bank works. Wi-Fi 6, so it isn't a bottleneck.\n\n## Setting it up\n\nDo this at home before you travel. You need a VPN provider that supports WireGuard. I used Mullvad.\n\n### Router\n\nPower on the Beryl AX, join the default network (`GL-AXT1800-XXX`), open `192.168.8.1` (bookmark it), and set an admin password.\n\nConfigure 2.4GHz and 5GHz with your home SSID and password. This is the trick: your devices can't tell the difference between this router and your actual one.\n\nRestart. Anything that knows your home Wi-Fi connects automatically.\n\n### VPN\n\nVPN, WireGuard Client, paste your Mullvad account number, hit Next. Name the profile, click Add. The router fetches and provisions the WireGuard configs.\n\nPick a server, click Connect. Status and VPN IP show in the dashboard.\n\nVerify from a connected device. Your IP should show the VPN server's location.\n\n### Hotel Wi-Fi\n\nAt the destination, Internet, Repeater, Connect. Pick the hotel network and enter the password.\n\nFor captive portals, enable \"Auto-Enable Login Mode for Public Hotspots.\" If a network rejects the router, \"Camouflage\" mode makes it look like a laptop or phone.\n\nThe router remembers networks, so the same hotel chain reconnects on its own.\n\n## What you end up with\n\nDevices connect using your home credentials. No password entry, no per-device authentication, no device caps.\n\nAll traffic flows through the encrypted VPN tunnel. The hotel only sees encrypted data heading to Mullvad.\n\nServer location is your call. Home country for geo-restricted content. Nearby for performance.\n\n## Trade-offs\n\nBandwidth drops because everything routes through the VPN. Fine for browsing, email, and streaming. Big downloads are slower than direct hotel Wi-Fi.\n\nSome corporate networks block VPN traffic aggressively. Mullvad offers multiple connection methods and servers when one path gets blocked.\n\nBattery on connected devices takes a minor hit from the always-on encryption.\n\n## Next: Tailscale\n\nThe Beryl AX supports Tailscale too. Tailscale isn't a traditional VPN. It builds encrypted mesh tunnels directly between your devices.\n\nWith Tailscale on the router, the home network follows you: print to your home printer from Tokyo, hit your NAS, SSH into your home server.\n\nHaven't tried it yet. Next on the list."
},
"description": "Bring your home network anywhere with the tiny Beryl AX router.",
"publishedAt": "2025-08-09T17:18:31.088Z",
"site": "at://did:plc:p5xem22ammiafn5kxonaksfa/site.standard.publication/3mlp3ywhyv2kx",
"tags": [
"travel",
"networking",
"tailscale",
"router",
"gl-inet"
],
"textContent": "Hotel Wi-Fi is terrible. Captive portals, device limits, privacy concerns.\n\nI tried the GL.iNet Beryl AX on my last trip. My dad had been running the same idea with the Slate AX and recommended it.\n\nSmall router, big difference.\n\nHow it works\n\nThe Beryl AX broadcasts your home SSID. Your devices connect automatically. Behind the scenes, the router talks to the hotel internet and routes everything through a VPN.\n\nThe hardware is tiny, about the size of a deck of cards. USB-C powered, so any phone charger or power bank works. Wi-Fi 6, so it isn't a bottleneck.\n\nSetting it up\n\nDo this at home before you travel. You need a VPN provider that supports WireGuard. I used Mullvad.\n\nRouter\n\nPower on the Beryl AX, join the default network (GL-AXT1800-XXX), open 192.168.8.1 (bookmark it), and set an admin password.\n\nConfigure 2.4GHz and 5GHz with your home SSID and password. This is the trick: your devices can't tell the difference between this router and your actual one.\n\nRestart. Anything that knows your home Wi-Fi connects automatically.\n\nVPN\n\nVPN, WireGuard Client, paste your Mullvad account number, hit Next. Name the profile, click Add. The router fetches and provisions the WireGuard configs.\n\nPick a server, click Connect. Status and VPN IP show in the dashboard.\n\nVerify from a connected device. Your IP should show the VPN server's location.\n\nHotel Wi-Fi\n\nAt the destination, Internet, Repeater, Connect. Pick the hotel network and enter the password.\n\nFor captive portals, enable \"Auto-Enable Login Mode for Public Hotspots.\" If a network rejects the router, \"Camouflage\" mode makes it look like a laptop or phone.\n\nThe router remembers networks, so the same hotel chain reconnects on its own.\n\nWhat you end up with\n\nDevices connect using your home credentials. No password entry, no per-device authentication, no device caps.\n\nAll traffic flows through the encrypted VPN tunnel. The hotel only sees encrypted data heading to Mullvad.\n\nServer location is your call. Home country for geo-restricted content. Nearby for performance.\n\nTrade-offs\n\nBandwidth drops because everything routes through the VPN. Fine for browsing, email, and streaming. Big downloads are slower than direct hotel Wi-Fi.\n\nSome corporate networks block VPN traffic aggressively. Mullvad offers multiple connection methods and servers when one path gets blocked.\n\nBattery on connected devices takes a minor hit from the always-on encryption.\n\nNext: Tailscale\n\nThe Beryl AX supports Tailscale too. Tailscale isn't a traditional VPN. It builds encrypted mesh tunnels directly between your devices.\n\nWith Tailscale on the router, the home network follows you: print to your home printer from Tokyo, hit your NAS, SSH into your home server.\n\nHaven't tried it yet. Next on the list.",
"title": "Take Your Network With You"
}