Set Up Tailscale Subnet Routing and Exit Nodes
Intermediatev1.0.0
Configure Tailscale subnet routers to access private networks and exit nodes for secure internet access — AWS VPC access, office network routing, and remote work security.
Content
Overview
Subnet routing lets you access entire private networks (AWS VPCs, office LANs) through a single Tailscale device. Exit nodes route all internet traffic through a specific location for security or geo-access. Both avoid installing Tailscale on every device.
Why This Matters
- -VPC access — reach AWS/GCP resources without traditional VPN
- -Office access — connect to office network devices remotely
- -Minimal installation — one Tailscale device serves entire subnet
- -Secure browsing — exit nodes encrypt all internet traffic
How It Works
Step 1: Advertise Subnet Routes
Step 2: Approve Routes (Admin Console or ACL)
Step 3: Access Subnet Resources
Step 4: Configure Exit Node
Step 5: Use Exit Node from Client
Step 6: Split DNS for Hybrid Routing
Best Practices
- -Enable IP forwarding on subnet router before advertising routes
- -Use autoApprovers in ACLs for automated infrastructure
- -Advertise only the specific subnets needed (not 0.0.0.0/0)
- -Set up redundant subnet routers for high availability
- -Use ACLs to control who can access advertised subnets
- -Monitor subnet router health and connectivity
Common Mistakes
- -Forgetting to enable IP forwarding (routes advertised but do not work)
- -Advertising overly broad subnets (0.0.0.0/0 routes all traffic)
- -No redundant subnet routers (single point of failure)
- -Not restricting subnet access with ACLs (everyone can reach everything)
- -Using exit nodes when split tunneling would suffice
FAQ
Discussion
Loading comments...