Other Platforms¶
macOS¶
App Store¶
The easiest installation method:
- Open the Mac App Store
- Search for "Tailscale"
- Click Get to install
- Open Tailscale from Applications
- Click the menu bar icon to connect
Homebrew¶
Standalone Package¶
Download from tailscale.com/download:
- Download the
.pkgfile - Double-click to install
- Follow the installation wizard
CLI Access on macOS¶
The macOS app includes CLI tools:
# Add to PATH (if needed)
export PATH="/Applications/Tailscale.app/Contents/MacOS:$PATH"
# Or use full path
/Applications/Tailscale.app/Contents/MacOS/Tailscale status
macOS System Extension¶
Tailscale uses a system extension that requires approval:
- Go to System Preferences → Security & Privacy
- Click Allow for Tailscale extension
- May require restart
Windows¶
GUI Installer¶
- Download from tailscale.com/download
- Run the
.exeinstaller - Click the system tray icon to connect
- Authenticate in browser
Winget¶
Chocolatey¶
Windows CLI¶
Windows Service¶
Tailscale runs as a Windows service:
# Check service status
Get-Service Tailscale
# Restart service
Restart-Service Tailscale
# View logs
Get-EventLog -LogName Application -Source Tailscale -Newest 50
Windows Server¶
Same installation as desktop. For headless/unattended:
# Download and install silently
$installer = "tailscale-setup.exe"
Invoke-WebRequest -Uri "https://pkgs.tailscale.com/stable/tailscale-setup-latest.exe" -OutFile $installer
Start-Process -FilePath $installer -Args "/quiet" -Wait
# Authenticate with auth key
tailscale up --auth-key=tskey-auth-xxxxx
iOS¶
App Store¶
- Open the App Store on your iPhone/iPad
- Search for "Tailscale"
- Tap Get to install
- Open the app and tap Get Started
- Sign in with your identity provider
Configuration¶
- Tap the Tailscale icon to toggle connection
- Use the app to manage exit nodes
- Enable/disable MagicDNS in settings
MDM Deployment¶
For enterprise deployment, use an MDM configuration profile:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>PayloadType</key>
<string>com.apple.vpn.managed</string>
<!-- VPN configuration -->
</dict>
</array>
</dict>
</plist>
Android¶
Google Play Store¶
- Open the Play Store
- Search for "Tailscale"
- Tap Install
- Open the app and sign in
Direct APK¶
Download APK from tailscale.com/download for sideloading.
Android TV¶
Install from Play Store on Android TV devices.
Features¶
- VPN toggle in quick settings
- Exit node selection
- Taildrop file receiving
- Widget support
FreeBSD¶
Package¶
pkg install tailscale
# Enable and start
sysrc tailscaled_enable="YES"
service tailscaled start
# Authenticate
tailscale up
Ports¶
OpenBSD¶
Package¶
pkg_add tailscale
# Start daemon
rcctl enable tailscaled
rcctl start tailscaled
# Authenticate
tailscale up
Synology NAS¶
Package Center¶
- Open Package Center
- Search for "Tailscale"
- Click Install
- Open Tailscale from main menu
- Click Log in and authenticate
SSH Installation (Alternative)¶
# SSH into Synology
ssh admin@synology-ip
# Download and install
curl -fsSL https://pkgs.tailscale.com/stable/tailscale_latest_amd64.tgz | tar xzf -
sudo cp tailscale_*/tailscale tailscale_*/tailscaled /usr/local/bin/
# Start manually
sudo /usr/local/bin/tailscaled &
sudo /usr/local/bin/tailscale up
QNAP NAS¶
App Center¶
- Open App Center
- Search for "Tailscale"
- Click Install
- Configure through web UI
TrueNAS¶
TrueNAS SCALE (Linux-based)¶
TrueNAS CORE (FreeBSD-based)¶
Use a jail:
# Create jail
iocage create -n tailscale -r 13.1-RELEASE
# Enter jail
iocage console tailscale
# Install
pkg install tailscale
Raspberry Pi¶
Raspberry Pi OS (Debian-based)¶
Performance Notes¶
- Works well on Pi 3 and later
- Pi Zero may have limited performance
- Enable hardware crypto if available
As Exit Node¶
# Enable IP forwarding
echo 'net.ipv4.ip_forward = 1' | sudo tee -a /etc/sysctl.conf
sudo sysctl -p
# Advertise as exit node
sudo tailscale up --advertise-exit-node
routers¶
OpenWrt¶
# Update packages
opkg update
# Install Tailscale
opkg install tailscale
# Start
/etc/init.d/tailscale start
/etc/init.d/tailscale enable
# Authenticate
tailscale up
pfSense/OPNsense¶
Use the Tailscale package from the package manager:
- Navigate to System → Package Manager
- Search for "tailscale"
- Install the package
- Configure through web UI
Ubiquiti EdgeRouter¶
# Add repository
curl -fsSL https://pkgs.tailscale.com/stable/debian/buster.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/tailscale-archive-keyring.gpg] https://pkgs.tailscale.com/stable/debian buster main" | sudo tee /etc/apt/sources.list.d/tailscale.list
# Install
sudo apt update
sudo apt install tailscale
# Configure
sudo tailscale up --advertise-routes=192.168.1.0/24
Virtual Machines¶
VMware¶
Install Tailscale inside the guest OS normally. No special VMware configuration needed.
VirtualBox¶
Same as VMware - install in guest OS.
Hyper-V¶
Install in guest Windows/Linux normally.
Proxmox VMs¶
Install in guest OS. For best performance:
Cloud Instances¶
AWS EC2¶
# User data script
#!/bin/bash
curl -fsSL https://tailscale.com/install.sh | sh
tailscale up --auth-key=tskey-auth-xxxxx --ssh
Google Cloud¶
# Startup script
curl -fsSL https://tailscale.com/install.sh | sh
tailscale up --auth-key=tskey-auth-xxxxx --ssh
Azure¶
# Custom script extension
curl -fsSL https://tailscale.com/install.sh | sh
tailscale up --auth-key=tskey-auth-xxxxx --ssh
DigitalOcean¶
# Droplet user data
#!/bin/bash
curl -fsSL https://tailscale.com/install.sh | sh
tailscale up --auth-key=tskey-auth-xxxxx --ssh
Embedded/IoT¶
General Requirements¶
- ARM or x86 architecture
- Linux kernel 4.x or later
- ~50MB storage
- ~30MB RAM
Static Binary¶
For minimal systems: