Situatie
If you’ve ever tried to access your homelab, NAS, or Proxmox server remotely, you’ve probably gone down the classic road: open a port on your router, pray to the NAT gods, and hope your ISP hasn’t slapped a CG-NAT on you.
Then there’s the security headache: exposed ports = exposed services = exposed vulnerabilities. And don’t get me started on managing dynamic IPs, firewalls, and all that jazz. But what if you could securely access your stuff from anywhere — no port forwarding, no VPN setup, no headaches?
Solutie
Tailscale is a zero-config VPN built on WireGuard that lets you create a secure mesh network between all your devices — across your house, your phone, your work laptop, your cloud VPS, whatever.
Here’s the kicker:
- No port forwarding
- No static IPs
- Works behind NAT
- Encryption baked in
Think of it like a private internet where only your devices can talk to each other.
How it Works (Simplified)
1. You install Tailscale on each device.
2. You log in (Google, GitHub, etc.).
3. Tailscale assigns each device a private IP like 100.x.x.x.
4. You can now SSH, RDP, or browse between them as if they were on the same LAN.
All traffic is end-to-end encrypted using WireGuard — and unlike OpenVPN or IPSec, you don’t have to configure squat
Common Use Cases
Here’s where Tailscale shines in a homelab or personal IT setup:
- Access Proxmox or TrueNAS UI remotely
- SSH into Raspberry Pi from your phone
- Mount a remote file share with SMB/NFS
- Run internal apps (like Home Assistant) without exposing them to the internet
- Remotely manage Docker containers or Portainer
Step-by-Step: Setting Up Tailscale on Your Homelab
Let’s walk through setting it up on a simple setup:
- You have a Proxmox server or Linux VM
- You want to access it from your laptop or phone, remotely
1. Install Tailscale on Your Server
curl -fsSL https://tailscale.com/install.sh | sh
sudo tailscale up
Follow the prompt to log in with a Google or GitHub account.Your server is now on your personal Tailscale network.
Want to SSH in? Use the new IP:
ssh user@100.x.x.x
or even easier:
ssh user@hostname.tailnet-name.ts.net
2. Install Tailscale on Your Other Devices
Windows
macOS
iOS / Android
Linux / Raspberry Pi
Docker containers
Just install, log in with the same account, and boom — all your devices can talk to each other.
3. Optional: Enable MagicDNS
Go to the Tailscale Admin Panel → DNS → Enable MagicDNS.
This gives you super clean hostnames like nas.tailnet-name.ts.net, instead of using IPs.
4. Set Access Control (ACLs)
Want to restrict which devices can talk to each other?
In the admin panel, go to Access Controls and define rules like:
{
“ACLs”: [
{
“Action”: “accept”,
“Users”: [“you@example.com”],
“Ports”: [“nas:22”, “proxmox:8006”]
}
]
}
—
Bonus: Exit Nodes and Subnets
Tailscale supports some really powerful features out of the box.
Exit Node
Route all your internet traffic through one of your devices (e.g., your home server) — similar to a personal VPN.
tailscale up –advertise-exit-node
Then from your phone or laptop, select that device as your exit node. Great for public Wi-Fi or bypassing geo-blocks.
Subnet Routing
Have multiple devices on your home LAN you can’t install Tailscale on?
You can enable subnet routing on one device to expose that whole subnet:
tailscale up –advertise-routes=192.168.1.0/24
Now even your old printer or IP camera is reachable through Tailscale — securely.
—
Pros and Cons
Pros
- Dead simple setup
- Works behind NAT/CG-NAT
- Free for personal use (up to 100 devices!)
- Native clients for all major OSes
- Private mesh network, no central data routing
Cons
- Requires third-party auth (Google, GitHub, etc.)
- Free plan doesn’t include some enterprise-level features (like SSO/SAML)
- For very advanced users, custom WireGuard configs may be more flexible
Wrapping Up
Tailscale is a game-changer for homelabbers, sysadmins, remote workers, and devs. It lets you stop worrying about firewalls and port forwarding, and just access your stuff — securely, reliably, from anywhere.
Set it up once, and it just works.
Leave A Comment?