• Pricing
  • Use cases
  • Enterprise
  • Customers
  • Download
  • Blog
  • Docs
  • Log In
  • Try for free
Business VPN

Replace your legacy VPN

Remote access

Securely access shared resources

Site-to-site networking

Connect internal resources and environments

Homelab

Create your own personal Internet

For teams

Low latency, and none of your traffic ever touches our servers.

For businesses

Low latency, and none of your traffic ever touches our servers.

For individuals

Low latency, and none of your traffic ever touches our servers.

FEATURED
Best practices used by billion-dollar companies
Read guide
Customer Stories
Blog
Log In Use Tailscale
  • Pricing
  • Business VPN
  • Remote access
  • Site-to-site networking
  • Homelab
  • Enterprise
  • Docs
  • Download
  • Customers
  • Blog
Docs › Integrations › NAS

Documentation

  • Start
    • Quickstart
    • What is Tailscale?
    • Features
    • Terminology & concepts
    • Install Tailscale
    • Set up an identity provider
    • Contact preferences
  • How-to Guides
    • Manage access
      • Access Control Lists (ACLs)
      • Manage devices
      • Manage users
      • Tailnet lock
      • Tailnet name
      • Domain ownership
    • Route traffic
      • Set up a subnet router
      • Set up an exit node
      • Use a Mullvad exit node
      • Use DNS
      • Set up MagicDNS
      • Tailscale Funnel
    • Set up servers
      • Set up a server
      • Use ACL tags
      • Install Tailscale with cloud-init
      • Use auth keys
      • Use Tailscale SSH
      • Set up SSH session recording
      • Set up HTTPS certificates
      • Run an ephemeral node
      • Run unattended
    • Access & share services
      • View services
      • Share nodes
      • Use Taildrop
    • Logging and events
      • Logging, auditing, and streaming
      • Configuration audit logging
      • Network flow logs
      • Log streaming
      • Webhooks
    • Solutions
      • Code from your iPad
      • DIY dogcam
      • Lock down a server
      • Access a PiKVM
      • Run a Pi-hole
      • Minecraft server
      • Minecraft server on NixOS
      • Secure external services
      • On-demand access
      • Infrastructure as code
  • Integrations
    • Cloud servers
    • Serverless apps
    • Databases
    • Remote environments
    • Developer tools
    • Firewalls
    • Web servers
    • NAS
      • Synology
      • QNAP
      • Unraid or FreeNAS
  • FAQ
  • Reference
    • ACL samples
    • CLI
    • API
    • Key prefixes
    • Security best practices
    • Shared responsibility
    • macOS and iOS shortcuts
    • Technical overviews
    • Troubleshooting
    • GitHub
  • Resources
    • Changelog
    • Comparisons
    • Release stages
    • Security
    • Versions
    • Pricing & billing
    • Use cases
    • Support
    • Support options
    • Generate a bug report
Docs › Integrations › NAS

Connect to network attached storage (NAS)

  • Synology
  • QNAP
  • Unraid or FreeNAS
  • Learn
  • SSH Keys
  • Docker SSH
  • DevSecOps
  • Multicloud
  • NAT Traversal
  • MagicDNS
  • PAM
  • PoLP
  • All articles
  • USE CASES
  • Business VPN
  • Remote Access
  • Homelab
  • Site-to-site Networking
  • Enterprise
  • Get Started
  • Overview
  • Pricing
  • Downloads
  • Documentation
  • How It Works
  • Why Tailscale
  • Compare Tailscale
  • Customers
  • Integrations
  • Changelog
  • Use Tailscale Free
  • Company
  • Company
  • Newsletter
  • Press Kit
  • Blog
  • Careers
  • Contact Sales
  • Contact Support
  • Open Source
  • Security
  • Compliance
  • Status
  • Twitter
  • Fediverse
  • GitHub
  • YouTube
  • Help & Contact
  • Contact Sales
  • Contact Support
  • Open Source
  • Security
  • Compliance
  • Status
  • Twitter
  • Fediverse
  • GitHub
  • YouTube

WireGuard is a registered
trademark of Jason A. Donenfeld.

© 2023 Tailscale Inc. All rights reserved.
Tailscale is a registered trademark of Tailscale Inc.

Privacy & Terms