Get started
Login
© 2024

Technical overviews

Explore the topics in this section for in-depth learning about common Tailscale concepts.

Learn more about the encrypted networking protocol that Tailscale is built upon.

Learn about Tailscale's use of encryption.

Learn about direct connections and relayed connections in Tailscale.

Learn how Tailscale assigns IP addresses and how to manage them.

Learn how Tailscale relates to the different layers of the OSI model.

Learn how to build smaller Tailscale binaries that takes up a minimal amount of disk space.

Learn about kernel mode and userspace mode and how each one works with subnet routers and exit nodes.

Learn about running Tailscale where you don't have access to create a VPN tunnel device, which is common in container environments.

Learn how nodes join a tailnet domain using node keys.

Lean how to protect your SSH servers by using Tailscale SSH.

Learn in-depth details about Tailnet lock to verify that nodes are not added to your tailnet without being signed by trusted nodes in your tailnet.

Learn about Taailscale's globally distributed DERP relay servers.

Learn how zero trust networks are used to secure private networks.

Learn in-depth details about IPv4 and IPv6.

Last updated Dec 10, 2024