Access Hetzner Servers privately using Tailscale
Hetzner provides Linux virtual machines from several datacenters in Europe. We can use Tailscale to securely access these servers.
Before you begin this guide, you’ll need a Tailscale network set up and configured with at least one existing device. Read our getting started guide if you need help with this.
ssh to the system and install the Tailscale client:
# curl -fsSL https://tailscale.com/install.sh | sh # tailscale up
In the next step we’ll remove ssh access from the public IP address, so:
- Find the tailscale IP address using
- Exit from the ssh session to the public IP address.
- Make a new SSH session to the Tailscale IP address.
If at least one side of a tunnel has “easy NAT,” where Tailscale can determine the UDP port number on the far side of the NAT device, then it will make direct connections to minimize latency. We ensure that Hetzner nodes can make direct connections by allowing UDP port 41641 to ingress through the firewall.
In the Firewall tab of the Hetzner Cloud Console click the Create Firewall button. Delete the SSH and ICMP rules and add a rule allowing UDP port 41641.
If you want to allow direct connection between Hetzner VMs, also add an outbound firewall rule allowing UDP port 3478.