tailscale.com Open in urlscan Pro
2600:9000:a602:b1e6:86d:8165:5e8c:295b  Public Scan

URL: https://tailscale.com/kb/1017/install/
Submission: On September 26 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

/kb

<form class="relative flex mb-3" action="/kb" autocomplete="off" autocapitalize="off" autocorrect="off" role=""><input type="search" name="q" value="tailscale.com" class="flex-grow flex-shrink-0 input input-icon hide-search-ui"
    placeholder="Search..." aria-label="Search"></form>

Text Content

 * Pricing
 * Use cases
 * Enterprise
 * Customers
 * Download
 * Blog

 * Docs
 * Log In
 * Try for free

Business VPN

Replace your legacy VPN

Remote access

Securely access shared resources

Site-to-site networking

Connect internal resources and environments

Homelab

Create your own personal Internet

Tailscale SSH

Keeping it secure with SSH


For teams

Low latency, and none of your traffic ever touches our servers.



For businesses

Low latency, and none of your traffic ever touches our servers.



For individuals

Low latency, and none of your traffic ever touches our servers.




FEATURED
Best practices used by billion-dollar companies
Read guide


Customer Stories

Blog

Log In Use Tailscale
 * Pricing
 * Business VPN
 * Remote access
 * Site-to-site networking
 * Homelab
 * Tailscale SSH
 * Enterprise
 * Docs
 * Download
 * Customers
 * Blog

Docs › Start


DOCUMENTATION

 * Start
   * Quickstart
   * What is Tailscale?
   * Features
   * Terminology & concepts
   * Install Tailscale
   * Set up an identity provider
   * Contact preferences
 * How-to Guides
   * Manage access
     * Access Control Lists (ACLs)
     * Manage devices
     * Manage users
     * Tailnet lock
     * Tailnet name
     * Domain ownership
   * Route traffic
     * Set up a subnet router
     * Set up an exit node
     * Use a Mullvad exit node
     * Use DNS
     * Set up MagicDNS
     * Tailscale Funnel
   * Set up servers
     * Set up a server
     * Use ACL tags
     * Install Tailscale with cloud-init
     * Use auth keys
     * Use Tailscale SSH
     * Set up SSH session recording
     * Set up HTTPS certificates
     * Run an ephemeral node
     * Run unattended
   * Access & share services
     * View services
     * Share nodes
     * Use Taildrop
   * Logging and events
     * Logging, auditing, and streaming
     * Configuration audit logging
     * Network flow logs
     * Log streaming
     * Webhooks
   * Solutions
     * Code from your iPad
     * DIY dogcam
     * Lock down a server
     * Access a PiKVM
     * Run a Pi-hole
     * Minecraft server
     * Minecraft server on NixOS
     * Secure external services
     * On-demand access
     * Infrastructure as code
 * Integrations
   * Cloud servers
   * Serverless apps
   * Databases
   * Remote environments
   * Developer tools
   * Firewalls
   * Web servers
   * NAS
 * FAQ
 * Reference
   * ACL samples
   * CLI
   * API
   * Key prefixes
   * Security best practices
   * Shared responsibility
   * macOS and iOS shortcuts
   * Technical overviews
   * Troubleshooting
   * GitHub
 * Resources
   * Changelog
   * Comparisons
   * Release stages
   * Security
   * Versions
   * Pricing & billing
   * Use cases
   * Support
   * Support options
   * Generate a bug report


Docs › Start


TAILSCALE QUICKSTART

Welcome! Follow the steps below to create your own private Tailscale network,
known as a tailnet.

STEP 1: SIGN UP FOR AN ACCOUNT

Sign up for a Tailscale account. Get started with a free plan for an
organizational plan.

Tailscale requires a Single Sign-On (SSO) provider, so you’ll need an Apple,
Google, Microsoft, GitHub, Okta, OneLogin, or other supported SSO identity
provider account to begin.

STEP 2: ADD A MACHINE TO YOUR NETWORK

Tailscale helps you connect your devices together. For that to be possible,
Tailscale needs to run on your device.

Tailscale works seamlessly with Linux, Windows, macOS, Raspberry Pi, Android,
Synology, and more. Download Tailscale and log in on the device.

Download Tailscale

STEP 3: ADD ANOTHER MACHINE TO YOUR NETWORK

The magic of Tailscale happens when it’s installed on multiple devices. Add more
of your devices and share Tailscale with your peers to grow your private
network. 

Add more machines to your network by repeating step 2 or by inviting others to
join your network.

Congratulations! You just created your own private Tailscale network!

--------------------------------------------------------------------------------

NEXT STEPS

Tailscale automatically assigns each machine on your network a unique 100.x.y.z
IP address, so that you can establish stable connections between machines no
matter where they are in the world, even when they switch networks, and even
behind a firewall.

What’s next?

 * Invite other users to join your tailnet using the Invite teams option
 * Connect to an existing network with a subnet router
 * Route traffic through a specific device with exit nodes
 * Restrict what users and devices can access with ACLs
 * Share files between your own devices, even across operating systems, with
   Taildrop
 * Share an existing service with your peers outside of your domain with node
   sharing

To manage your network, including your machines and configurations, visit the
admin console.

NEED SOME INSPIRATION?

How about you use Tailscale to…

 * Keep your internet activities private on an untrusted network, by routing
   your traffic through an exit node that you run
 * Administer a computer remotely, and lock down your connections to a Microsoft
   Remote Desktop Protocol (RDP) server
 * Run a code server and develop remotely from your iPad when you’re on the road
 * Quickly share prototype servers with other colleagues without needing to
   wrangle with firewall settings
 * Host a private server for you and your peers to play Minecraft or chat on IRC
 * Receive files from a Network Attached Storage server using FTP, and view
   media files from players like VLC or Plex
 * Connect an Apple TV to your tailnet for viewing your media server files, use
   your Apple TV as an exit node to route traffic through your home internet
   connection when you’re away, or choose an exit node to route your Apple TV’s
   traffic through.

Even historically insecure protocols like Telnet, VNC, FTP, HTTP, etc. are
protected with Tailscale, since all traffic is encrypted under the hood using
WireGuard®.

LEARN MORE ABOUT TAILSCALE



WHAT IS TAILSCALE?

Get a brief introduction to Tailscale.

DNS IN TAILSCALE

Learn how to automatically assign DNS names for devices in your Tailscale
network.

SUBNET ROUTERS AND TRAFFIC RELAY NODES

Learn how to relay traffic from your Tailscale network onto your physical
subnet.

NETWORK ACCESS CONTROLS (ACLS)

Find out how ACLs let you define what a particular user or device is permitted
to access on your Tailscale network.



Last updated Sep 18, 2023


ON THIS PAGE

 * * Step 1: Sign up for an account
   * Step 2: Add a machine to your network
   * Step 3: Add another machine to your network
   * Next steps
   * Need some inspiration?
   * Learn more about Tailscale

 * Learn
 * SSH Keys
 * Docker SSH
 * DevSecOps
 * Multicloud
 * NAT Traversal
 * MagicDNS
 * PAM
 * PoLP
 * All articles

 * USE CASES
 * Business VPN
 * Remote Access
 * Homelab
 * Site-to-site Networking
 * Tailscale SSH
 * Enterprise

 * Get Started
 * Overview
 * Pricing
 * Downloads
 * Documentation
 * How It Works
 * Why Tailscale
 * Compare Tailscale
 * Customers
 * Integrations
 * Changelog
 * Use Tailscale Free

 * Company
 * Company
 * Newsletter
 * Press Kit
 * Blog
 * Careers
 * Contact Sales
 * Contact Support
 * Open Source
 * Security
 * Compliance
 * Status
 * Twitter
 * Fediverse
 * GitHub
 * YouTube

 * Help & Contact
 * Contact Sales
 * Contact Support
 * Open Source
 * Security
 * Compliance
 * Status
 * Twitter
 * Fediverse
 * GitHub
 * YouTube

WireGuard is a registered
trademark of Jason A. Donenfeld.

© 2023 Tailscale Inc. All rights reserved.
Tailscale is a registered trademark of Tailscale Inc.

Privacy & Terms