puter/common/tailscale.nix

18 lines
387 B
Nix
Raw Normal View History

2025-03-23 21:48:46 +00:00
{config, ...}: {
services.tailscale = {
enable = true;
openFirewall = true;
};
networking.firewall = {
trustedInterfaces = [
config.services.tailscale.interfaceName
];
# Required to connect to Tailscale exit nodes
checkReversePath = "loose";
2025-03-30 15:58:29 +00:00
interfaces.${config.services.tailscale.interfaceName} = {
allowedTCPPorts = [4000];
};
2025-03-23 21:48:46 +00:00
};
}