Tailscale
Overview
The Zyxel Device supports Tailscale, a site-to-site mesh VPN (Virtual Private Network) service that connects client devices (computer, smartphone, router, firewall) across different networks.
What You Can Do in this Chapter
Use the
VPN > Tailscale screen (see
The Tailscale Screen) to configure Tailscale settings.
What You Need to Know
By default, Tailscale only routes traffic between client devices running Tailscale and does not protect public Internet traffic. However, there may be times when you want to route traffic from the Tailscale VPN to the public Internet, such as when you need access to an online service only available in another country.
In the following figure, the Tailscale server (TS) creates a mesh network, allowing each client device to connect directly with others, resulting in lower latency. The Zyxel Device act as the exit node (E) to route the VPN traffic to the public Internet.
The Tailscale Screen
Use this screen to configure Tailscale settings. Click VPN > Tailscale to open this screen.
The following table describes the labels in this screen.
VPN > Tailscale
label | description |
---|
General Settings |
Enable | Enable this to run Tailscale on the Zyxel Device so that VPN clients with Tailscale software can establish a VPN connection. |
Auth Keys | Generate an authentication key in the Tailscale admin console and enter it here. |
Server Port | Enter the port number for VPN clients to communicate with the Tailscale server. The default port number is 41641. |
Routing |
As an Exit Node | By default, Tailscale only routes VPN traffic between running client devices, but does not route VPN traffic to the Internet. Enable this if you want Tailscale to route the client devices’ Internet traffic through the Zyxel Device. See What You Need to Know for more information about exit node. |
Advertised Networks | You must first enable Tailscale, enter the Auth Key, and click Apply in this screen to select a SUBNET-type object. Select a subnet if you want to set up site-to-site VPN from a subnet behind the Zyxel Device to another subnet defined in the Tailscale admin console. The selected subnets are open for access by the Tailscale network. When other client devices in the Tailscale network send traffic to these subnets, the Zyxel Device routes the traffic to the other client devices. |
Add | Click Add to add a SUBNET-type object for other Tailscale client devices to access. |
Remove | Select an entry and click Remove to remove a subnet from the table. |
Network | This displays the subnet(s) on the Zyxel Device that other Tailscale client devices can access. |
Advanced Settings |
Accept routes | Enable this to allow the Zyxel Device to access devices behind a peer gateway in other LAN networks. If you disable this, the Zyxel Device can only access the peer VPN gateways in other LAN networks, but not the devices behind those peer VPN gateways. |
Default SNAT | Select this to have the Zyxel Device use the IP address of the outgoing interface as the source IP address of the packets it sends out through its WAN trunk interfaces. The Zyxel Device automatically adds local source IP addresses for traffic it routes from internal interfaces to external interfaces. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving. |
Set Up a Tailscale Network
Follow these steps to set up a Tailscale network and have your Zyxel Device connect to it.
Sign Up for Tailscale
1 Go to the
Tailscale website and click
Get started. Alternatively, you can download and install the Tailscale software on your network device, such as a computer or smartphone, then sign up and log in.
Connect the Zyxel Device to Tailscale
1 First, you need to create an authentication key for your Zyxel Device to join the Tailscale network. Go to Settings > Keys in the Tailscale admin console, and click Generate auth key. The following screen appears. Enter a description to identify the key, then click Generate key to create the key.
2 The following screen appears. Copy the key to the clipboard and click Done. This key will be use to authenticate the Zyxel Device to the Tailscale network. Keep it in a safe place.
3 To ensure the key never expires, go to the Machines screen, click the More icon next to your Zyxel Device, then click Disable key expiry.
4 Go to VPN > Tailscale in the Zyxel Device’s Web Configurator, enable Tailscale, paste the copied key into the Auth Keys field, then click Apply to authenticate and connect the Zyxel Device to the Tailscale network.
5 To check if the Zyxel Device has successfully connected to the Tailscale network, go to the Machines screen in the Tailscale admin console. Your Zyxel Device should appear in the list.
Add Subnets for Tailscale Access
1 Go to
VPN >
Tailscale in the Web Configurator, click
Add Advertised Networks, and select a
SUBNET-type object to add the subnet on the Zyxel Device for the Tailscale network to access. Click the

icon, then click
Apply to save the settings.
2 To approve the Zyxel Device’s subnets to join Tailscale, go to the Machines screen in the Tailscale admin console, click your Zyxel Device from the list. The following screen appears, select the subnet(s) for Tailscale to access, and click Save.
3 To have the Zyxel Device access the subnet behind other sites, go to VPN > Tailscale in the Web Configurator and enable Accept routes and Default SNAT, and click Apply to save the changes.
Set the Zyxel Device as an Exit Node
Set the Zyxel Device as an exit node to allow other client devices to route traffic to the Internet through the Zyxel Device. See
The Tailscale Screen for more information about exit node.
1 Go to VPN > Tailscale in the Web Configurator and enable As an Exit Node on the Zyxel Device.
2 Go to the Machines screen in the Tailscale admin console, click your Zyxel Device from the list. The following screen appears, select Use as exit node, and click Save.
3 In the machine list, your Zyxel Device will be displayed as an exit node.