Fact-checked by Grok 2 weeks ago

Tailscale

Tailscale is a software-defined (VPN) service that enables secure, zero-configuration connectivity between devices, servers, and services across the using the protocol for . Built on open-source foundations, it facilitates point-to-point networking with automatic , eliminating the need for manual or complex rules, and supports granular access controls based on user identity and device posture. The service is designed for both personal and enterprise use, allowing users to create private networks that span clouds, on-premises environments, and mobile devices without traditional VPN hardware. Tailscale operates by leveraging a lightweight coordination server to manage authentication, key distribution, and , while all data traffic flows directly between peers via tunnels for optimal performance and security. This architecture enforces zero-trust principles, where access is restricted to the minimum necessary privileges, and integrates with over 100 tools such as , , and identity providers like and . Key features include subnet routing for site-to-site connections, MagicDNS for simplified device naming, and enterprise-grade tools like audit logs, SSH session recording, and automated device onboarding, all while maintaining SOC 2 compliance and regular security audits. Founded in 2019 in , , by software engineers Avery Pennarun, , and David Crawshaw—former contributors to projects at and other tech firms—Tailscale Inc. emerged from a desire to revive the decentralized, user-centric networking ideals of the early . The company, which operates fully remotely with a diverse team, has raised significant funding, including a $14.5 million CAD Series A in 2020 and subsequent rounds from investors like Accel and , reaching Series C status by 2025. Tailscale has gained widespread adoption, serving over 10,000 organizations, including notable companies like , , and , for use cases ranging from remote team access to secure deployments and homelab setups. Its free tier for personal use has made it popular among developers and hobbyists, while enterprise offerings emphasize scalability and compliance for production environments. The platform's open-source components, hosted on , encourage community contributions and transparency in its core implementation.

History

Founding and Early Development

Tailscale was founded in 2019 in , , by former engineers Avery Pennarun, , David Crawshaw, and Brad Fitzpatrick. The company emerged from the founders' shared experiences at , where they worked on large-scale distributed systems, aiming to recreate the simplicity of internal networking for external use. The name "Tailscale" draws inspiration from Google's 2013 research paper "The Tail at Scale," which discusses handling variability in massive distributed systems. This reference reflects the founders' intent to address the "" of networking challenges—those rare but problematic edge cases in connectivity—that traditional solutions often overlook. From its inception, Tailscale focused on resolving zero-config VPN difficulties faced by developers, leveraging the protocol to enable seamless without manual or complex setups. The goal was to provide secure, connections that mimicked the ease of internal corporate networks, eliminating the hassles of legacy VPNs like firewall rules and hardware dependencies. Early development proceeded as an open-source project hosted on , with the initial code release for the client occurring in 2020. This was followed by the product's general availability announcement in April 2020, highlighting its emphasis on rapid deployment and user-friendly authentication over the intricacies of conventional VPN configurations.

Funding and Growth

Tailscale secured $12 million in Series A funding in November 2020, led by Accel with participation from Heavybit and Uncork Capital, to accelerate of its distributed networking platform. In May 2022, the company raised $100 million in a Series B round co-led by CRV and , with additional investment from Accel, Heavybit, and Uncork Capital, valuing Tailscale at $1 billion and supporting expansion into enterprise markets. In April 2025, Tailscale raised $160 million in a Series C round led by Accel, with participation from CRV, , Heavybit, and Uncork Capital. By 2025, Tailscale's user base had grown to millions of connected devices worldwide, with over 10,000 paid business customers, highlighting strong enterprise adoption among organizations seeking secure, zero-trust networking solutions. This expansion was driven by the platform's scalability and integration capabilities, enabling widespread use in both small teams and large-scale deployments. Key milestones included the launch of paid tiers in June 2021, with Team and Business plans starting at $5 and $15 per user per month, respectively, to monetize enterprise features. By 2023, Tailscale had deepened integrations with major cloud providers like AWS, , and , facilitating seamless connectivity across hybrid environments. The project is licensed under the BSD-3-Clause license.

Technical Overview

Core Architecture

Tailscale employs a mesh VPN architecture that enables direct, connections between devices, forming a secure virtual known as a "tailnet." At its core, this model leverages as the data plane, which establishes lightweight, encrypted tunnels for all communication between nodes. WireGuard handles the encryption, decryption, and routing of traffic in a cryptographically secure manner, ensuring end-to-end protection without relying on intermediary proxies for the primary data flow. This design prioritizes efficiency and simplicity, allowing devices to communicate as if on a while maintaining high performance for applications like or remote access. The , managed by Tailscale's centralized coordination server, oversees key management, authentication, and network coordination to facilitate these peer connections. It generates and distributes public-private key pairs to authenticated devices, enabling secure establishment without manual configuration. occurs through OAuth 2.0 and Connect protocols, integrating with identity providers such as , , or enterprise SSO systems, while device provisioning can use ephemeral auth keys—essentially shared secrets—for automated or headless setups. The also enforces access policies and handles topology updates, ensuring nodes receive only the necessary information to connect to authorized peers. To prevent address conflicts with existing private networks, Tailscale assigns IPv4 addresses from the (CGNAT) range of 100.64.0.0/10, as specified in 6598. This range, reserved for shared address space in ISP environments (spanning 100.64.0.0 to 100.127.255.255), is unlikely to overlap with standard 1918 private subnets like 192.168.0.0/16 or 10.0.0.0/8 used in home or enterprise LANs. Additionally, Tailscale assigns IPv6 addresses from the (ULA) range fc00::/8, as defined in 4193, enabling dual-stack networking. By operating within this space, Tailscale ensures stable, unique identifiers for nodes across diverse network environments, including those behind multiple layers, without exposing addresses to the public . Tailscale's adopts a client- model, where lightweight client software runs on each node to manage local operations and periodic check-ins with the coordination . Nodes register upon joining the tailnet, receiving their assignment, keys, and peer maps from the , which acts solely as a and rather than a . This separation allows for scalable, decentralized while centralizing administrative functions, making the resilient to individual node failures and easy to deploy on endpoints like laptops, , or devices.

Networking Mechanisms

Tailscale employs several techniques to traverse (NAT) devices and establish direct (P2P) connections between nodes. The primary method involves (Session Traversal Utilities for NAT), where clients query DERP servers acting as STUN servers to discover their public IP addresses and ports from an external perspective. This enables , allowing peers to simultaneously send packets to each other's discovered endpoints, thereby creating a direct path through symmetric or restrictive NATs without requiring . To enhance connectivity in environments with port-restricted NATs, Tailscale supports port mapping protocols such as , , and . These protocols allow clients to request the NAT device to open specific public ports and forward traffic to the internal endpoint, effectively making the NAT "friendlier" by bypassing rules for those ports. When direct connections fail due to complex NAT configurations or firewalls blocking , Tailscale falls back to DERP (Detoured Encrypted Routing Protocol) relays, which forward encrypted packets over streams, ensuring connectivity even in restrictive networks. For accessing local subnets behind a Tailscale node, particularly on Linux, Source NAT (SNAT) can be disabled on the VPN interface using the --snat-subnet-routes=false flag to route traffic directly to devices on the local network without address translation. This subnet routing capability allows users to expose entire local networks—such as office or datacenter subnets—to the Tailscale mesh, enabling seamless access to resources like printers or servers that are not individually enrolled. DERP relay servers play a crucial role in maintaining reliable connections by not only serving as a fallback but also selecting low-latency paths among a of regionally distributed relays. These servers forward end-to-end encrypted traffic using WireGuard keys, preserving privacy while minimizing overhead in scenarios where direct paths are unavailable. To support dynamic network topologies, Tailscale implements automatic key rotation and endpoint discovery through its coordination server. Nodes periodically generate new keypairs, share updated public keys via the server, and use STUN-derived endpoint information to rediscover peers without manual reconfiguration. This process ensures ongoing connectivity as devices move between networks or IP addresses change.

Features

Security and Access Controls

Tailscale implements a zero-trust networking model, where no implicit trust is granted based on network location or perimeter, requiring of every access request through and enforcement. This approach eliminates default access, mandating explicit approvals for device joins to the tailnet and for sharing subnets, ensuring that only authorized entities can participate in the network. Access controls are enforced via Access Control Lists (ACLs), which adhere to the principle of least by defining granular permissions for traffic between nodes, users, and groups on a deny-by-default basis. ACLs specify sources (such as users, groups, or tagged devices) and destinations (including IP addresses, ports, and protocols), allowing administrators to restrict lateral movement and limit exposure within the tailnet. Tailscale Services, in public beta as of October 2025, allows defining services on the tailnet with virtual IP addresses (TailVIPs) and DNS names, enabling load balancing and more granular access controls via policies on these resources. All communications in Tailscale are secured with end-to-end encryption using the WireGuard protocol, which employs the Noise IK handshake for key exchange based on Curve25519 elliptic curve cryptography. Mutual authentication occurs through public-private key pairs, where each node's public key is verified before establishing a connection, preventing unauthorized access without relying on central decryption. Tailscale's mesh networking supports direct peer-to-peer connections secured by this encryption model. Tailscale also supports state encryption for the state file at rest on disk, using platform-specific mechanisms such as TPM 2.0 on Windows and or on macOS, to protect private keys from cloning attacks (introduced in version 1.86, July 2025). Tailscale provides audit logging for connection events, attempts, and changes, including actions, to enable and . These logs can be streamed to external systems for analysis, and Tailscale integrates with identity providers such as and for (SSO) and (MFA), enhancing access verification without compromising log integrity.

Management Tools

Tailscale provides a web-based admin console as the primary for managing a tailnet, which is the created by the service. Accessible via login.tailscale.com/admin, the console allows administrators to oversee users, devices, DNS settings, and permissions centrally. Device approvals are handled through this , where administrators can review and authorize new devices joining the network to ensure only trusted hardware connects. Additionally, the Access Controls page enables direct editing of lists (ACLs), which define granular permissions for users and devices within the tailnet. A visual policy editor, available in beta since August 2025, offers a web-based for editing ACLs with forms, previews, and switchable views. The Tailscale CLI, invoked via the tailscale command, offers local command-line operations for device-level management and troubleshooting. Administrators can use tailscale status to check connection details, including IP addresses, machine names, and online status of peers in the tailnet. For IP assignments, the tailscale ip command retrieves a device's Tailscale or , supporting queries for remote devices by . Exit node setup is facilitated through the tailscale up command with flags like --advertise-exit-node to designate a device as an exit node or --exit-node=<[IP](/page/IP)|name> to route traffic via one. Tailscale's API supports programmatic automation of tailnet operations, available to all plans and authenticated via access tokens generated in the admin console. These tokens, with expiration periods from 1 to 90 days, enable scripting for tasks such as dynamic policy updates and device management. The API also facilitates monitoring by allowing queries for network state and events, integrating with external tools for automated workflows. Detailed endpoints are documented interactively at tailscale.com/api. For oversight, Tailscale includes a dashboard integrated into the admin console, providing visibility into tailnet health. This features display device online status, last seen timestamps for health assessment, and for running applications. Traffic statistics and are supported through network flow logging, which captures node-to-node interactions and can stream to SIEM systems for alerting on unusual patterns. Client metrics, exportable to Prometheus-compatible systems, further enhance of performance and uptime.

Supported Platforms

Client Operating Systems

Tailscale provides client software for a variety of end-user operating systems, enabling secure networking on desktops, mobiles, and select systems. The client implementations are designed to integrate seamlessly with each platform's native networking , supporting both graphical interfaces (GUIs) for ease of use and command-line interfaces (CLIs) for advanced configuration. For desktop environments, Tailscale supports Microsoft Windows versions 10 and later, as well as and later, through a native application that includes both and CLI components. Installation on Windows is typically performed via an installer or download from the official package , with the client running as a system service for persistent connectivity. On macOS (version 12 Monterey or later), the client utilizes a system extension for VPN integration, available via the for -based setup or as a standalone package from Tailscale's for CLI-focused users; this approach ensures with macOS's model without extensions. support covers major distributions including (via APT), , , CentOS/RHEL (via YUM/DNF), and , with pre-built packages hosted on Tailscale's stable ; users can install via package managers followed by the tailscale up command to authenticate and connect. Auto-updates are handled through built-in mechanisms on these platforms, such as the tailscale update CLI command where available, or via distribution-specific tools. Mobile device support includes dedicated apps for (version 8 or later) and (version 15 or later), distributed through the Google Play Store and , respectively. The client operates with a background service to maintain VPN tunnels even when the app is not in the foreground, installing a system VPN configuration upon first launch. On , the app leverages Apple's Network Extension framework to establish per-app or full-device VPN profiles, allowing split-tunnel or full-tunnel modes with automatic handling of background connectivity restrictions. For Apple TV devices running tvOS 17 or later (version 18 or later recommended), a limited-purpose app enables media streaming and basic networking, installed via the and configured similarly to with VPN profile approval; it supports features like exit node functionality but lacks full CLI access. Additionally, a client exists for Plan 9 operating systems, ported to support both minimal forks like 9legacy and modified variants like 9front, allowing legacy systems to join Tailscale networks for and interactions. Tailscale clients can also extend to containerized environments via lightweight integrations, such as running the client within containers.

Integrations and Extensions

Tailscale provides robust integrations with container orchestration platforms, enabling seamless networking for containerized workloads. The service offers an official image, maintained and built from source by Tailscale, available on Docker Hub and GitHub Packages, which allows users to connect containers directly to a Tailscale network (tailnet) without complex configuration. For Kubernetes environments, Tailscale supplies a dedicated Operator that automates the deployment of Tailscale sidecars or proxies within clusters, facilitating secure pod-to-pod communication and extending the tailnet to include cluster resources. This operator supports installation via charts and integrates with the Tailscale using credentials to manage device and dynamically. On the server side, Tailscale extends compatibility to popular (NAS) and devices. For NAS systems, Tailscale is available as an official package in the Synology Package Center, complete with a user-friendly web interface for , allowing remote access to NAS resources over the tailnet without . This integration supports DSM 6 and DSM 7 across various architectures, with precompiled packages provided by Tailscale for stable deployments. devices are fully compatible through Tailscale packages tailored for Raspbian distributions, such as Bookworm and Trixie, enabling these low-power boards to function as edge routers in tailnets. Users can configure instances as subnet routers to bridge local networks or as nodes for , leveraging the device's portability for remote or distributed setups. Tailscale integrates with major cloud providers to extend tailnet connectivity to virtual private clouds (VPCs) via subnet routers, which advertise routes to cloud resources without requiring native Tailscale clients on every instance. For (AWS), subnet routers deployed in an Amazon VPC enable direct access to Elastic Compute Cloud (EC2) instances and other resources, following best practices outlined in Tailscale's AWS reference architecture for and scalability. In (GCP), similar subnet router configurations connect to VPCs, with reference architectures emphasizing secure ingress and egress controls for Compute Engine workloads. For , subnet routers facilitate access to Virtual Network (VNet) resources, allowing Tailscale to route traffic to Azure Virtual Machines and other services while maintaining encryption end-to-end. Within tailnets, Tailscale enhances usability through features like MagicDNS and exit nodes, which simplify domain resolution and traffic management. MagicDNS automatically generates and registers DNS names for all devices using the .ts.net domain, enabling custom resolution for services across the network without manual DNS configuration. Exit nodes allow users to route all non-Tailscale internet traffic through a designated device in the tailnet, providing a secure egress point that can enforce policies or bypass restrictions, with support for mandatory selection via user roles and IP address overrides. These capabilities integrate across platforms, ensuring consistent networking behavior from containers to cloud environments.

Use Cases

Personal and Small-Scale Applications

Tailscale enables individuals and small teams to establish secure, networks for everyday remote needs, particularly in environments where traditional VPN setups can be complex. For networking, users can securely connect to devices such as NAS storage, printers, or smart systems without requiring or exposing services to the , allowing seamless from anywhere via or devices. This approach simplifies remote management of personal homelabs, where Tailscale's zero-config setup facilitates quick integration of multiple devices into a unified . In developer workflows, Tailscale supports small-scale by connecting local machines to remote servers for testing and , or by enabling secure sharing of development environments among a handful of collaborators without the overhead of public configurations. For instance, freelance teams can use it to access shared repositories or testing instances on personal hardware, ensuring encrypted connections that mimic a experience. Tailscale's free tier is tailored for these personal and small-scale applications, supporting up to 3 users and 100 devices per network, which accommodates most individual VPN requirements like family access from mobile devices or secure in small freelance groups. This limitation keeps the service accessible for non-commercial use while encouraging upgrades only for larger deployments.

Enterprise and Organizational Deployments

Tailscale serves as a (SASE) solution in environments, enabling organizations to replace traditional VPNs with a zero-trust that provides granular access controls for remote workforces. By leveraging WireGuard-based connections, Tailscale eliminates the need for centralized gateways, reducing and simplifying management while enforcing identity-based policies to restrict access to specific resources. This approach supports distributed teams by allowing secure connectivity without exposing entire networks, a common vulnerability in older VPN systems. In cloud-native deployments, Tailscale facilitates overlay networks for clusters and spanning hybrid environments, such as AWS, , GCP, and on-premises infrastructure. Organizations use Tailscale's operator or sidecar proxies to enable zero-trust access to cluster and workloads, ensuring developers and services connect securely without public endpoints. For instance, it integrates with Amazon EKS for hybrid node management, allowing seamless routing across multi-cloud setups while maintaining . This overlay model supports patterns, optimizing connectivity for containerized applications in dynamic, scaled environments. Tailscale's compliance features, including SOC 2 Type II certification, aid organizations in regulated sectors by demonstrating robust controls for and . The platform enforces encryption, audit logging, and zero-trust principles that align with standards like HIPAA, supporting healthcare providers in securing remote to patient data systems. Integration with single sign-on (SSO) providers via SAML, OIDC, or native IdPs enables seamless in finance and healthcare, where federation is critical for with governance requirements. These capabilities help meet audit criteria for confidentiality and availability without compromising operational efficiency. For scalability, Tailscale handles tailnets with tens of thousands of nodes through custom lists (ACLs) that define granular policies for users, groups, and resources. Enterprises deploy it for branch office connectivity, linking distributed sites with low-overhead that avoids bottlenecks in large-scale setups. In management, companies connect thousands of edge devices—such as sensors and equipment—for secure monitoring and control, using features like subnet routers to extend the network reliably across global deployments. This architecture supports configurations, ensuring resilience as node counts grow.

References

  1. [1]
    Tailscale · Best VPN Service for Secure Networks
    Securely connect to anything on the internet with Tailscale. Deploy a WireGuard®-based VPN to achieve point-to-point connectivity that enforces least ...DownloadTailscale LoginPricingCareersHow it works
  2. [2]
    VPN startup Tailscale raises $14.5 million CAD Series A | BetaKit
    Nov 10, 2020 · Founded in 2019, Tailscale was created by a group of former Google software engineers. The startup claims to make network security accessible to ...
  3. [3]
    Tailscale - Crunchbase Company Profile & Funding
    Legal Name Tailscale Inc. ; Operating Status Active ; Company Type For Profit ; Founders Avery Pennarun, David Carney, David Crawshaw.<|control11|><|separator|>
  4. [4]
    Tailscale - 2025 Company Profile, Team, Funding & Competitors
    Aug 3, 2025 · Tailscale is a series C company based in Toronto (Canada), founded in 2019 by David Crawshaw, David Carney and Avery Pennarun.
  5. [5]
    We're Building the New Internet | About Tailscale
    We're returning to the original vision of the Internet. We want to help everyone create their own secure networks built around people and their connections.
  6. [6]
    tailscale/tailscale: The easiest, most secure way to use ... - GitHub
    This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool.
  7. [7]
    Founded by Ex-Googlers, Tailscale Launches to Secure and ...
    Apr 2, 2020 · Tailscale is a new kind of corporate VPN that requires no hardware or infrastructure and sets up in minutes. Founded in 2019 by ex-Google engineers.
  8. [8]
    Tailscale closes $128 million CAD Series B to scale VPN service ...
    May 4, 2022 · Tailscale was founded in 2019 by a group of former Google software engineers, including Montréal-based Pennarun, Toronto-based COO David Carney, ...
  9. [9]
    Tailscale has reached general availability
    Apr 2, 2020 · Just over a year ago, we founded Tailscale with a common sense of nostalgia for the “good old days” of LANs. In our collective opinion (then ...
  10. [10]
    Tailscale with Avery Pennarun & Brad Fitzpatrick
    Jan 15, 2022 · So yes, in fact, the original joke was because, uh, the paper by Google from a few years ago called, “The Tail at Scale” it's a really ...Missing: origin | Show results with:origin
  11. [11]
    The tail at scale | Communications of the ACM
    Vol. 56, No. 2 · The tail at scale. research-article. Free access. Share on. The tail at scale. Authors: Jeffrey Dean. Jeffrey Dean. Google Inc., Mountain View, ...Missing: Tailscale origin
  12. [12]
    Encrypted tunneling with Tailscale and WireGuard - Red Hat
    Apr 30, 2020 · Tailscale is a secure network for WireGuard-encrypted traffic, requiring no configuration and no new firewall rules.
  13. [13]
    First open source release - Tailscale
    Feb 10, 2020 · We just made the first bits of the Tailscale code public, starting with the Linux client and its dependent/common code.
  14. [14]
    Tailscale Raises $12M Led by Accel to Build Distributed Networks ...
    Nov 10, 2020 · TORONTO--(BUSINESS WIRE)--Today, Tailscale announced US$12 million in Series A funding from Accel, with participation from Heavybit and Uncork ...
  15. [15]
    Tailscale raises $100M… to fix the Internet
    May 4, 2022 · We've raised $100M in a Series B financing led by CRV and Insight Partners, with participation from our existing major investors: Accel, Heavybit, and Uncork ...
  16. [16]
    10,000 customers, a new Operations SVP, and the bigger picture
    Jan 14, 2025 · Those 10,000 customers? They're all part of a large and growing network—millions of Tailscale-enabled devices connected across personal and ...Missing: base | Show results with:base
  17. [17]
    New Pricing Model Makes Scaling with Tailscale Less Expensive
    Jun 28, 2021 · When billed annually, the Team plan is $5/user/month, and the Business plan is $15/user/month, up to 50% less than before.What's New? · Subnet Routers · Access Controls
  18. [18]
    Integrations for Almost Anything - Tailscale
    Start here to learn how easy it is to integrate Tailscale with the stack your teams already trust ... Cloud Providers, Kubernetes and Containers, Infrastructure ...Missing: major 2023
  19. [19]
    Tailscale Packages - stable track
    Want to know what's new? Check the Tailscale changelog. View older version: latest, 1.90.6, 1.90.5, 1.90.4, 1.90.3, 1.90.Missing: April 2025 license
  20. [20]
    Control and data planes · Tailscale Docs
    Dec 10, 2024 · Device-to-device communication functions of the data plane include establishing WireGuard tunnels, encrypting and decrypting traffic, managing ...Missing: CGNAT | Show results with:CGNAT
  21. [21]
    About WireGuard · Tailscale Docs
    Mar 3, 2025 · WireGuard is an open source network tunneling protocol for creating encrypted communication channels. It's designed to replace other VPN protocols.
  22. [22]
    OAuth clients · Tailscale Docs
    Oct 30, 2025 · An OAuth client consists of a client ID and a client secret. When you create an OAuth client, Tailscale creates these for you. Within your ...Tailscale OAuth token endpoint · OAuth client libraries · Register new nodes using...
  23. [23]
    Auth keys · Tailscale Docs
    Sep 24, 2025 · Use Tailscale auth keys to authenticate devices, automate device provisioning, and enhance security. Create and manage auth keys for ...Types of auth keys · Key expiry · Generate an auth key
  24. [24]
    What are these 100.x.y.z addresses? · Tailscale Docs
    Aug 18, 2025 · IP addresses from the CGNAT range are special-use IPv4 addresses from the 100.64.0.0/10 subnet ( 100.64.0.0 through 100.127.255.255 ). They're ...
  25. [25]
  26. [26]
    How it works - Tailscale
    Mar 20, 2020 · WireGuard creates a set of extremely lightweight encrypted tunnels between your computer, VM, or container (which WireGuard calls an “endpoint” ...Missing: CGNAT | Show results with:CGNAT
  27. [27]
    What is STUN? · Tailscale Docs
    Aug 6, 2025 · Tailscale uses STUN (session traversal utilities for NAT) to enable direct communication between devices behind NAT firewalls or routers. The ...
  28. [28]
    How NAT traversal works - Tailscale
    Aug 21, 2020 · Learn how NAT traversal works, how Tailscale can get through and securely connect your devices directly to each other.Figuring Out Firewalls · The Nature Of Nats · Nat Notes For Nerds
  29. [29]
    Subnet routers · Tailscale Docs
    Install the Tailscale client. · Connect to Tailscale as a subnet router. · Enable subnet routes from the admin console. · Add access rules for advertised subnet ...
  30. [30]
    DERP servers · Tailscale Docs
    DERP (Designated Encrypted Relay for Packets) servers manage device connections and NAT traversal. They serve two primary purposes: negotiating direct ...Derp Servers · Derp Server Locations · Customize Your Derp Map
  31. [31]
    "Zero Trust Networking" definition · Tailscale Docs
    Aug 6, 2025 · Tailscale supports a hybrid configuration of Zero Trust and subnet routes, making it easier to migrate huge networks cautiously and ...
  32. [32]
    Manage permissions using ACLs · Tailscale Docs
    There are two ways to define access controls for your tailnet: access control lists (ACLs) and grants. Both methods follow a deny-by-default principle.
  33. [33]
    Tailscale encryption
    Tailscale's architecture provides end-to-end encryption for all network communications, whether devices connect directly or through a relayed connection.Tailscale Encryption · Control Plane · Data Plane<|control11|><|separator|>
  34. [34]
    Tailscale Docs - Logging, Streaming, and Events
    Feb 5, 2025 · Network audit logs. Configure network flow logging to capture connection information between nodes in your tailnet. Stream logs and events to a ...Missing: exchanges | Show results with:exchanges
  35. [35]
    Supported SSO identity providers · Tailscale Docs
    Aug 3, 2025 · Tailscale works on top of the identity provider (IdP) or single sign-on (SSO) provider that you already use.
  36. [36]
    Configuration audit logging · Tailscale Docs
    Jul 20, 2022 · Configuration audit logs record actions that modify a tailnet's configuration, including the type of action, the actor, the target resource, and the time.
  37. [37]
    Terminology and concepts · Tailscale Docs
    Sep 30, 2025 · The admin console is the central location to manage your Tailscale network (known as a tailnet). You can manage devices on your network, users ...
  38. [38]
    Manage devices · Tailscale Docs
    Feb 3, 2025 · Tailscale manages devices via device approval, web interface, and device posture, which can limit access for devices not meeting security ...Add a device · Device approval · Use the web interfaceMissing: console monitoring health
  39. [39]
    Tailscale CLI
    The Tailscale client includes a built-in command-line interface (CLI) you can use to manage and troubleshoot your device within your Tailscale network.Using the Tailscale CLI · Tab completion · Command Reference · completion
  40. [40]
    Tailscale Docs - API
    Sep 18, 2025 · Tailscale offers an application programming interface (API) to let you automate various aspects of your network.
  41. [41]
    Features - Tailscale
    Tailscale makes it easy to overlay any network topology, enforce the principle of least privilege, and continuously monitor your tailnet.
  42. [42]
  43. [43]
    Better node monitoring with new client metrics - Tailscale
    Dec 17, 2024 · Tailscale client metrics are now available for local or remote examination, and can be directly ingested by Prometheus or any compatible monitoring system.Missing: console | Show results with:console
  44. [44]
    Download | Tailscale
    Download and the Tailscale app from the Play Store; Accept the prompts to install a VPN configuration; Sign up with your team's email address ...Install Tailscale on Windows · Subnet routers · Install with one command · Key expiryMissing: 1.82.5 April BSD license
  45. [45]
    Install Tailscale on Windows
    Aug 22, 2025 · The current version of the Tailscale client available for download requires Windows 10 or later or Windows Server 2016 or later. This topic ...
  46. [46]
    Install Tailscale on macOS
    Sep 11, 2025 · Download and install the Tailscale client using one of the following options: Standalone variant from Tailscale's package server (recommended).
  47. [47]
    Three ways to run Tailscale on macOS
    Install Tailscale from the Mac App Store. Download and install the open source tailscale + tailscaled CLI-only distribution from our GitHub repo.
  48. [48]
    Install Tailscale on Linux
    Install Tailscale on Linux · Ubuntu · Debian · CentOS · openSUSE · Oracle Linux · Red Hat® Enterprise Linux · Fedora Linux · Other.
  49. [49]
    Update Tailscale
    Sep 26, 2025 · Devices using the iOS, macOS (App Store version), and Android (Google Play Store version) operating systems might not have automatic updates ...
  50. [50]
    Using Tailscale for Android just got a whole lot better
    May 15, 2024 · A major overhaul that significantly enhances the Android app and brings some of Tailscale's most widely used and requested features to the Android platform.Missing: background | Show results with:background
  51. [51]
    Deploy Tailscale on iOS/tvOS using MDM
    Dec 20, 2024 · If you are deploying Tailscale for iOS/tvOS using MDM, you can use configuration profiles to automate parts of the onboarding process for the app, reducing ...
  52. [52]
    Hey linker, can you spare a meg? - Tailscale
    Oct 7, 2021 · Tailscale on iOS runs as a special kind of app, a Network Extension. This lets us run in the background, so we can secure traffic from all ...
  53. [53]
    Install Tailscale on an Apple TV
    Open the Tailscale app on tvOS. In the Welcome to Tailscale for tvOS page, select Install VPN Configuration, then select Allow. In the Tailscale app ...
  54. [54]
    Apple TV, now with more Tailscale
    Sep 18, 2023 · Learn how Apple TV now supports Tailscale with tvOS 17, enabling secure remote networking, media streaming, and exit node functionality.
  55. [55]
    Porting Tailscale to Plan 9
    Apr 2, 2025 · There are two main forks of Plan 9: a very minimal one (9legacy) and a more modified one (9front). So far Tailscale has only been tested on ...
  56. [56]
    Using Tailscale with Docker
    Tailscale has a published Docker image that Tailscale manages and builds from source. It's available in Docker Hub and GitHub Packages.Pull image · Supported tags · Parameters
  57. [57]
    Docker Image - tailscale
    Tailscale lets you connect your devices and users together in your own secure virtual private network. Tailscale enables encrypted point-to-point connections.
  58. [58]
    Tailscale on Kubernetes
    Sep 19, 2025 · You can run Tailscale inside a Kubernetes Cluster using the Tailscale Kubernetes Operator, or as a sidecar, as a proxy, or as a subnet router.Setup · Sample sidecar · Userspace sidecar · Sample proxy
  59. [59]
    Kubernetes operator · Tailscale Docs
    Tailscale Kubernetes Operator must be configured with OAuth client credentials. The operator uses these credentials to manage devices via Tailscale API.Installation · Helm · (optional) Pre-Creating A...
  60. [60]
    Access Synology NAS from anywhere · Tailscale Docs
    Tailscale lets you remotely access your Synology NAS. In the video below, Alex covers the basics you need know to get up and running.
  61. [61]
    Tailscale and the Synology Package Center
    Oct 18, 2021 · Tailscale is officially supported in the Synology package center. Tailscale + Synology makes it effortless to securely access your Synology NAS from anywhere ...
  62. [62]
    Synology packages for tailscale.com - GitHub
    Tailscale also makes precompiled packages available for DSM6 and DSM7, supporting a variety of architectures. Stable: stable releases.
  63. [63]
  64. [64]
    Connect to an AWS VPC using subnet routes · Tailscale Docs
    This guide describes steps to deploy a Tailscale subnet router to an Amazon Virtual Private Cloud (Amazon VPC) to enable direct access to Amazon Elastic Compute ...
  65. [65]
    AWS reference architecture · Tailscale Docs
    Aug 18, 2025 · This document details best practices and a reference architecture for Tailscale deployments on Amazon Web Services (AWS).Missing: Google | Show results with:Google
  66. [66]
    Google Cloud Platform reference architecture · Tailscale Docs
    Aug 3, 2025 · This document details best practices and a reference architecture for Tailscale deployments on Google Cloud Platform (GCP).
  67. [67]
    MagicDNS · Tailscale Docs
    Set up an exit node · Set up an app connector · Use DNS · Set up MagicDNS · Set up ... MagicDNS automatically registers DNS names for devices in your network.
  68. [68]
    Exit nodes (route all traffic) · Tailscale Docs
    The exit node feature lets you route all traffic through a specific device on your Tailscale network (known as a tailnet). The device routing your traffic is ...Recommended exit nodes · Mandatory exit nodes · User roles · IP addresses
  69. [69]
    Homelab Networking Setup | Securely Connect Devices & Services ...
    Tailscale's free plan is perfect for personal homelab use. You can connect up to 100 devices on the free plan, which covers most homelab setups. The Tailscale ...
  70. [70]
    The best ways to use Tailscale for sharing with friends and family
    Sep 15, 2025 · You can use Tailscale to access a printer—or anything on your home network, really—while you're away from it. Typically, you do this by ...
  71. [71]
    Tailscale, a virtual programmable network for DevOps
    Tailscale seamlessly integrates into any GitOps workflow with support for popular Infrastructure as Code (IaC) tools like Terraform, Pulumi, and Ansible.
  72. [72]
    Ngrok vs Cloudflare Tunnel vs Tailscale: Complete 2025-26
    Sep 2, 2025 · Tailscale works well for small teams needing secure device connectivity, particularly in remote work scenarios where team members need access to ...
  73. [73]
    Tailscale Pricing - Compare Free Personal Plan & Business Tiers for ...
    Plans that work for everyone. Free for personal use. Starter for $6 per user/month, Premium $18 per user/month. Contact us for Enterprise pricing.<|separator|>
  74. [74]
    Free pricing plans and discounts · Tailscale Docs
    Sep 23, 2025 · Free pricing plans and discounts. For an overview of Tailscale's pricing plans, including paid plans, refer to our Pricing page. Personal plan.Missing: 2021 | Show results with:2021
  75. [75]
    What you need to know about secure access service edge - Tailscale
    Tailscale creates secure peer-to-peer connections using the WireGuard VPN protocol and applying zero trust security principles between the parties involved.
  76. [76]
    Business VPN Secure Remote Access for Remote Employees
    Can Tailscale replace our legacy VPN infrastructure? Absolutely. Tailscale replaces legacy business VPN software with a modern, zero-trust network overlay ...Missing: SASE | Show results with:SASE<|separator|>
  77. [77]
    Replacing a legacy VPN - Tailscale
    Replacing your legacy VPN service can help you improve your online privacy and security, while improving connection reliability and speed. For example, ...Missing: deployments | Show results with:deployments
  78. [78]
    Migrate from a legacy VPN to Tailscale
    Tailscale runs on most operating systems, including Linux, Windows, macOS, iOS, and Android.
  79. [79]
    VPN Replacement for Multi-Cloud Infrastructure - Tailscale
    Tailscale's mesh overlay network replaces VPNs with Zero Trust access across AWS, Azure, GCP, and on-prem. Identity-first connectivity for Kubernetes, ...Missing: major 2023
  80. [80]
    Simplify network connectivity using Tailscale with Amazon EKS ...
    Aug 6, 2025 · Tailscale can help streamline this network connectivity between your EKS Hybrid Nodes data plane and Amazon EKS Kubernetes control plane. Unlike ...
  81. [81]
    Secure, Zero-Trust Access for Kubernetes (Start for Free) | Tailscale
    The most simple and secure way to connect the Kubernetes API and workloads to developers, internal users, and shared services without public exposure.
  82. [82]
    Tailscale's SOC 2 Compliance: Strengthening Data Security
    May 17, 2022 · Tailscale is SOC 2 certified and built for security with enforced encryption, access control and zero-trust principles.Missing: finance healthcare
  83. [83]
    Tailscale and HIPAA Compliance
    Tailscale can support your HIPAA compliance requirements by providing secure peer-to-peer communications for your remote workers.Hipaa Compliance And Remote... · How Tailscale Promotes... · Lack Of Multi-Factor...Missing: SOC 2
  84. [84]
    Tailscale can help you become SOC 2 compliant
    Tailscale can help improve the security posture at your organization in a way that satisfies many of the SOC 2 requirements auditors will review.Confidentiality & Privacy · What Is Soc 2 And How Does... · Privacy & ConfidentialityMissing: finance healthcare
  85. [85]
    Real-world enterprise use cases: Tailscale patterns from the field
    Jan 29, 2025 · Tailscale is considered one of the best business VPN solutions due to its security, scalability, and ease of use. I think of this use case as ...Missing: SASE | Show results with:SASE
  86. [86]
    Securely Networking for IoT & Edge Devices (Start for Free) - Tailscale
    Secure, manage, and monitor IoT & edge devices. Reliably connect to thousands of devices with Tailscale's zero trust network overlay.Manage Remote Access To... · Connect Thousands Of Devices... · Everything Needed To Build A...
  87. [87]
    Set up high availability · Tailscale Docs
    Oct 3, 2025 · By placing a subnet router in front of each application or VPC, regional routing will automatically route device traffic on to the nearest ...Missing: peering | Show results with:peering