Reference syntax for the tailnet policy file.| Tailscale
Use Tailscale tags to authenticate and identify non-user devices, such as a server.| Tailscale
Manage and troubleshoot your tailnet with the Tailscale command-line interface (Tailscale CLI).| Tailscale
Tailscale uses Designated Encrypted Relay for Packets (DERP) servers for secure, low-latency connections in your tailnet. Customization options let you optimize device communication and NAT traversal.| Tailscale
Configure access control lists (ACLs) in Tailscale to manage device permissions and secure your network.| Tailscale
Find out how to automatically register DNS names for devices in your Tailscale network.| Tailscale
Learn how NAT traversal works, how Tailscale can get through and securely connect your devices directly to each other.| tailscale.com
Understand the entire Tailscale system, how it works, how we built it, and its benefits compared to legacy VPNs. Use this article as a guide to quickly build your own Tailscale replacement.| tailscale.com