tailscale.com
Open in
urlscan Pro
2600:9000:a602:b1e6:86d:8165:5e8c:295b
Public Scan
URL:
https://tailscale.com/kb/1017/install/
Submission: On September 26 via manual from US — Scanned from DE
Submission: On September 26 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOM/kb
<form class="relative flex mb-3" action="/kb" autocomplete="off" autocapitalize="off" autocorrect="off" role=""><input type="search" name="q" value="tailscale.com" class="flex-grow flex-shrink-0 input input-icon hide-search-ui"
placeholder="Search..." aria-label="Search"></form>
Text Content
* Pricing * Use cases * Enterprise * Customers * Download * Blog * Docs * Log In * Try for free Business VPN Replace your legacy VPN Remote access Securely access shared resources Site-to-site networking Connect internal resources and environments Homelab Create your own personal Internet Tailscale SSH Keeping it secure with SSH For teams Low latency, and none of your traffic ever touches our servers. For businesses Low latency, and none of your traffic ever touches our servers. For individuals Low latency, and none of your traffic ever touches our servers. FEATURED Best practices used by billion-dollar companies Read guide Customer Stories Blog Log In Use Tailscale * Pricing * Business VPN * Remote access * Site-to-site networking * Homelab * Tailscale SSH * Enterprise * Docs * Download * Customers * Blog Docs › Start DOCUMENTATION * Start * Quickstart * What is Tailscale? * Features * Terminology & concepts * Install Tailscale * Set up an identity provider * Contact preferences * How-to Guides * Manage access * Access Control Lists (ACLs) * Manage devices * Manage users * Tailnet lock * Tailnet name * Domain ownership * Route traffic * Set up a subnet router * Set up an exit node * Use a Mullvad exit node * Use DNS * Set up MagicDNS * Tailscale Funnel * Set up servers * Set up a server * Use ACL tags * Install Tailscale with cloud-init * Use auth keys * Use Tailscale SSH * Set up SSH session recording * Set up HTTPS certificates * Run an ephemeral node * Run unattended * Access & share services * View services * Share nodes * Use Taildrop * Logging and events * Logging, auditing, and streaming * Configuration audit logging * Network flow logs * Log streaming * Webhooks * Solutions * Code from your iPad * DIY dogcam * Lock down a server * Access a PiKVM * Run a Pi-hole * Minecraft server * Minecraft server on NixOS * Secure external services * On-demand access * Infrastructure as code * Integrations * Cloud servers * Serverless apps * Databases * Remote environments * Developer tools * Firewalls * Web servers * NAS * FAQ * Reference * ACL samples * CLI * API * Key prefixes * Security best practices * Shared responsibility * macOS and iOS shortcuts * Technical overviews * Troubleshooting * GitHub * Resources * Changelog * Comparisons * Release stages * Security * Versions * Pricing & billing * Use cases * Support * Support options * Generate a bug report Docs › Start TAILSCALE QUICKSTART Welcome! Follow the steps below to create your own private Tailscale network, known as a tailnet. STEP 1: SIGN UP FOR AN ACCOUNT Sign up for a Tailscale account. Get started with a free plan for an organizational plan. Tailscale requires a Single Sign-On (SSO) provider, so you’ll need an Apple, Google, Microsoft, GitHub, Okta, OneLogin, or other supported SSO identity provider account to begin. STEP 2: ADD A MACHINE TO YOUR NETWORK Tailscale helps you connect your devices together. For that to be possible, Tailscale needs to run on your device. Tailscale works seamlessly with Linux, Windows, macOS, Raspberry Pi, Android, Synology, and more. Download Tailscale and log in on the device. Download Tailscale STEP 3: ADD ANOTHER MACHINE TO YOUR NETWORK The magic of Tailscale happens when it’s installed on multiple devices. Add more of your devices and share Tailscale with your peers to grow your private network. Add more machines to your network by repeating step 2 or by inviting others to join your network. Congratulations! You just created your own private Tailscale network! -------------------------------------------------------------------------------- NEXT STEPS Tailscale automatically assigns each machine on your network a unique 100.x.y.z IP address, so that you can establish stable connections between machines no matter where they are in the world, even when they switch networks, and even behind a firewall. What’s next? * Invite other users to join your tailnet using the Invite teams option * Connect to an existing network with a subnet router * Route traffic through a specific device with exit nodes * Restrict what users and devices can access with ACLs * Share files between your own devices, even across operating systems, with Taildrop * Share an existing service with your peers outside of your domain with node sharing To manage your network, including your machines and configurations, visit the admin console. NEED SOME INSPIRATION? How about you use Tailscale to… * Keep your internet activities private on an untrusted network, by routing your traffic through an exit node that you run * Administer a computer remotely, and lock down your connections to a Microsoft Remote Desktop Protocol (RDP) server * Run a code server and develop remotely from your iPad when you’re on the road * Quickly share prototype servers with other colleagues without needing to wrangle with firewall settings * Host a private server for you and your peers to play Minecraft or chat on IRC * Receive files from a Network Attached Storage server using FTP, and view media files from players like VLC or Plex * Connect an Apple TV to your tailnet for viewing your media server files, use your Apple TV as an exit node to route traffic through your home internet connection when you’re away, or choose an exit node to route your Apple TV’s traffic through. Even historically insecure protocols like Telnet, VNC, FTP, HTTP, etc. are protected with Tailscale, since all traffic is encrypted under the hood using WireGuard®. LEARN MORE ABOUT TAILSCALE WHAT IS TAILSCALE? Get a brief introduction to Tailscale. DNS IN TAILSCALE Learn how to automatically assign DNS names for devices in your Tailscale network. SUBNET ROUTERS AND TRAFFIC RELAY NODES Learn how to relay traffic from your Tailscale network onto your physical subnet. NETWORK ACCESS CONTROLS (ACLS) Find out how ACLs let you define what a particular user or device is permitted to access on your Tailscale network. Last updated Sep 18, 2023 ON THIS PAGE * * Step 1: Sign up for an account * Step 2: Add a machine to your network * Step 3: Add another machine to your network * Next steps * Need some inspiration? * Learn more about Tailscale * Learn * SSH Keys * Docker SSH * DevSecOps * Multicloud * NAT Traversal * MagicDNS * PAM * PoLP * All articles * USE CASES * Business VPN * Remote Access * Homelab * Site-to-site Networking * Tailscale SSH * Enterprise * Get Started * Overview * Pricing * Downloads * Documentation * How It Works * Why Tailscale * Compare Tailscale * Customers * Integrations * Changelog * Use Tailscale Free * Company * Company * Newsletter * Press Kit * Blog * Careers * Contact Sales * Contact Support * Open Source * Security * Compliance * Status * Twitter * Fediverse * GitHub * YouTube * Help & Contact * Contact Sales * Contact Support * Open Source * Security * Compliance * Status * Twitter * Fediverse * GitHub * YouTube WireGuard is a registered trademark of Jason A. Donenfeld. © 2023 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc. Privacy & Terms