1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-07-23 02:35:25 +02:00

tailscale*: update page (#15936)

This commit is contained in:
Lena 2025-03-15 21:55:25 +00:00 committed by GitHub
parent 4d6e686201
commit 138da1285a
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
4 changed files with 23 additions and 22 deletions

View file

@ -6,8 +6,8 @@
- Send a file to a specific node:
`sudo tailscale file cp {{path/to/file}} {{hostname|ip}}:`
`tailscale file cp {{path/to/file}} {{hostname|ip}}:`
- Store files that were sent to the current node into a specific directory:
`sudo tailscale file get {{path/to/directory}}`
`tailscale file get {{path/to/directory}}`

View file

@ -5,7 +5,7 @@
- Advertise/Disable SSH on the host:
`sudo tailscale up --ssh={{true|false}}`
`tailscale up --ssh={{true|false}}`
- SSH to a specific host which has Tailscale-SSH enabled:

View file

@ -1,37 +1,38 @@
# tailscale up
> Connect the client to the Tailscale network.
> In version 1.8 and above, command-line arguments are stored and reused until they're overwritten or `--reset` is called.
> Note: run `sudo tailscale set --operator $USER` to allow the current user to run these commands.
> All options described here can be changed later using `tailscale set --option argument`. Use `--option=false` to disable options that don't require arguments.
> More information: <https://tailscale.com/kb/1080/cli/#up>.
- Connect to Tailscale:
`sudo tailscale up`
`tailscale up`
- Connect and offer the current machine to be an exit node for internet traffic:
`sudo tailscale up --advertise-exit-node`
`tailscale up --advertise-exit-node`
- Connect using a specific node for internet traffic:
`sudo tailscale up --exit-node={{exit_node_ip}}`
`tailscale up --exit-node {{exit_node_ip}}`
- Connect and block incoming connections to the current node:
`sudo tailscale up --shields-up`
`tailscale up --shields-up`
- Connect and don't accept DNS configuration from the admin panel (defaults to `true`):
`sudo tailscale up --accept-dns=false`
`tailscale up --accept-dns=false`
- Connect and configure Tailscale as a subnet router:
`sudo tailscale up --advertise-routes={{10.0.0.0/24,10.0.1.0/24,...}}`
`tailscale up --advertise-routes {{10.0.0.0/24,10.0.1.0/24,...}}`
- Connect and accept subnet routes from Tailscale:
`sudo tailscale up --accept-routes`
`tailscale up --accept-routes`
- Reset unspecified settings to their default values and connect:
`sudo tailscale up --reset`
`tailscale up --reset`

View file

@ -2,19 +2,23 @@
> A private WireGuard network service.
> Some subcommands such as `up` have their own usage documentation.
> More information: <https://tailscale.com>.
> More information: <https://tailscale.com/kb/1080/cli>.
- Allow the current user to operate on the Tailscale daemon:
`sudo tailscale set --operator $USER`
- Connect to Tailscale:
`sudo tailscale up`
`tailscale up`
- Disconnect from Tailscale:
`sudo tailscale down`
`tailscale down`
- Display the current Tailscale IP addresses:
- Display all devices connected to Tailscale (with their IP addresses):
`tailscale ip`
`tailscale status`
- Ping a peer node at the Tailscale layer and display which route it took for each response:
@ -24,14 +28,10 @@
`tailscale netcheck`
- Start a web server for controlling Tailscale:
- Start a web server for controlling the Tailscale daemon:
`tailscale web`
- Display a shareable identifier to help diagnose issues:
`tailscale bugreport`
- Display help for a subcommand:
`tailscale {{subcommand}} --help`