# Tailscale VPN Tailscale VPN from [https://tailscale.com/](https://tailscale.com/) - [ ] configures a host interface `tailscale0` - [ ] installs auto-start for tailscale daemon `/etc/systemd/system/multi-user.target.wants/tailscaled.service` - [ ] starts service at boot allocating IP address 100.100.69.2 to the tailscale0 nic - [ ] attaches tailscale0 nic to the shared VPN - [ ] makes accessible 100.100.69.X addresses - [ ] makes the HOST available as an exit node configured to use account via the admin console via [https://login.tailscale.com/admin](https://login.tailscale.com/admin)
[![pngtree-banner-with-important-icon-vector-picture-image_7826342-244127159.png](https://bookstack.pknw1.co.uk/uploads/images/gallery/2025-06/scaled-1680-/lT9pngtree-banner-with-important-icon-vector-picture-image-7826342-244127159.png)](https://bookstack.pknw1.co.uk/uploads/images/gallery/2025-06/lT9pngtree-banner-with-important-icon-vector-picture-image-7826342-244127159.png)The server **SSH service** running on port 69 isonly exposed on the tailscale0 interface via the IP 100.100.69.2 once the daemon has started via `/etc/systemd/system/ssh-after-tailscale.service and can only be accessed when connected to a valid VPN client` `#!/bin/bash` `while ! ip addr show tailscale0 | grep -q "inet "; ` `do` `    sleep 10` `done` `systemctl start ssh`