๐ก๏ธWhat is Tailscale?
๐ Secure Remote Access with Tailscale Mesh VPN
Tailscale is a modern mesh VPN that replaces traditional VPN appliances and port-forwarding schemes with identity-aware networking. In the managed services environment, Tailscale enables secure, encrypted communication between authorized support workstations and client servers, while significantly reducing attack surface and complexity.
๐ซ No Open Firewall Ports Required
Unlike legacy VPNs, Tailscale requires no inbound ports to be opened on firewalls. Devices initiate outbound connections over HTTPS to Tailscale's coordination service and establish encrypted tunnels using WireGuard.
This allows:
- Full NAT traversal
- No changes to client network firewalls
- Reduced security risk by eliminating exposed services
๐ Mesh Connectivity with Granular Access Control
Tailscale forms a peer-to-peer mesh network, with access restricted using an Access Control List (ACL) based on device tags and identity.
Hereโs how access is managed:
โ Allowed Communication Paths:
- Support workstations can communicate with:
- Other support workstations on all ports
- Client servers on TCP ports 443, 9090, and 22
- Client servers via Tailscale SSH (distinct from traditional SSH over port 22)
- Client servers using ICMP (ping) for basic network diagnostics (via
:1pseudo-port)
๐ซ Blocked Communication:
- Client servers cannot communicate with one another โ this east-west traffic is intentionally blocked to contain potential threats and enforce segmentation.
- No external users or devices can access Tailscale-connected systems unless explicitly allowed via ACL.
๐ Port-Level and Protocol-Level Restrictions
Protocol/Port | Purpose | Who Can Access |
|---|---|---|
TCP 443 | Web interfaces / APIs (HTTPS) | Support workstations only |
TCP 9090 | Cockpit or other admin dashboards | Support workstations only |
TCP 22 | Traditional SSH, SCP, Rsync | Support workstations only |
Tailscale SSH | Encrypted SSH over Tailscale | Support workstations only |
ICMP (Ping) | Network diagnostics | Support workstations only |
Tailscale SSH does not use TCP port 22. Itโs a built-in feature that allows authorized users to initiate SSH sessions based on identity, not IP or port.
๐ก๏ธ Identity-Based Security and Tagging
Each device in the Tailscale network is tagged with a functional role. These tags are assigned by administrators and used in ACL policies to tightly control access.
Benefits:
- Access is role-based, not IP-based
- Dynamic IPs or network changes have no impact on access
- All access is logged and auditable
โ Summary of Benefits
Feature | Traditional VPN | Tailscale Mesh VPN |
|---|---|---|
Requires inbound firewall rules | โ Yes | โ No |
Centralized VPN gateway needed | โ Yes | โ No (peer-to-peer) |
Peer-to-peer connectivity | โ No | โ Yes |
Port-based access restrictions | โ ๏ธ Complex ACLs | โ Simple, enforced via config |
Device identity-based security | โ IP-based | โ User and device-based |
Granular access by role/tag | โ ๏ธ Limited | โ Fully customizable |
Server-to-server communication | โ Possible by default | โ Explicitly blocked |
SSH control with auditability | โ External dependency | โ Built-in via Tailscale SSH |
Diagnostic access (ICMP) | โ ๏ธ Rarely permitted | โ Controlled via dummy port |
๐ง Additional Notes
- No VPN client configuration is required on client networksโonly the Tailscale client installed on managed devices.
- No static IP management is needed; device names and identities stay consistent across network changes.
- Logging and auditability: Tailscale SSH and ACL enforcement actions are logged and traceable for security reviews.
Updated on: 27/11/2025
Thank you!
