Locking Down My Homelab with Tailscale ACLs

How I Secured Device-to-Device Access Without Sacrificing Convenience

Tailscale: How it works


The Problem: Too Much Trust in My Tailnet

When I first set up Tailscale for my homelab just so I can access my desktop at home, I loved how effortlessly it connected all my devices. But I soon realized something unsettling: every device could communicate with every other device by default.

This became a concern because my homelab includes:

  • Media servers (Plex, Jellyfin, many other services)

  • IoT devices

  • Monitoring systems (Raspberry Pi running uptime checks)

I needed to implement least-privilege access—where devices only have the permissions they absolutely need.


Tailscale ACLs to the Rescue

Luckily, Tailscale's Access Control Lists (ACLs) are designed to support this approach. Initially, setting up all the rules seemed daunting, but I managed to configure them over an evening.

Here's how I locked things down.


Step 1: Defined My Devices

First, I mapped out my devices in the ACL file for clarity:

{
  "hosts": {
    "admin-laptop": "100.64.0.1",    // My primary workstation
    "admin-phone": "100.64.0.2",     // For remote management
    "nas": "100.64.0.3",             // File storage (SMB/NFS)
    "plex-server": "100.64.0.4",     // Media streaming
    "smart-tv": "100.64.0.5",        // Should NOT access NAS!
    "monitoring-pi": "100.64.0.6"    // Pings internal LAN
  }
}

Why this matters:

  • Using descriptive names (nas instead of 100.64.0.3) makes rules easier to maintain

  • Helps avoid mistakes when adding new devices later


Step 2: Crafted My Access Rules

1. Full Access for Admin Devices

I wanted these 2 devices to have no restrictions for now:

{
  "action": "accept",
  "src": ["admin-laptop", "admin-phone"],
  "dst": ["*:*"]  // All ports, all devices
}

2. Media Access for Streaming Devices

My smart TV should only reach Plex—not my NAS!

{
  "action": "accept",
  "src": ["smart-tv"],
  "dst": ["plex-server:32400"]  // Plex port only
},
{
  "action": "deny",
  "src": ["smart-tv"],
  "dst": ["nas:*"]  // Explicitly block NAS access
}

3. LAN Access for Monitoring

My Raspberry Pi needs to ping internal LAN devices (192.168.1.0/24) but nothing else:

{
  "action": "accept",
  "src": ["monitoring-pi"],
  "dst": ["192.168.1.0/24:*"],
  "proto": "icmp"  // Ping only
}

The Complete ACL Configuration

{
  "hosts": {
    "admin-laptop": "100.64.0.1",
    "admin-phone": "100.64.0.2",
    "nas": "100.64.0.3",
    "plex-server": "100.64.0.4",
    "smart-tv": "100.64.0.5",
    "monitoring-pi": "100.64.0.6"
  },
  "acls": [
    // Admins get full access
    {
      "action": "accept",
      "src": ["admin-laptop", "admin-phone"],
      "dst": ["*:*"]
    },
    // Smart TV can only access Plex
    {
      "action": "accept",
      "src": ["smart-tv"],
      "dst": ["plex-server:32400"]
    },
    // Explicitly block Smart TV from NAS
    {
      "action": "deny",
      "src": ["smart-tv"],
      "dst": ["nas:*"]
    },
    // Monitoring Pi can ping LAN
    {
      "action": "accept",
      "src": ["monitoring-pi"],
      "dst": ["192.168.1.0/24:*"],
      "proto": "icmp"
    }

  ]
}

Testing & Validation

After applying these rules:

DeviceExpected AccessTest Result
Admin LaptopFull access to all devices✅ Works
Admin PhoneFull access to all devices✅ Works
Smart TVOnly Plex (port 32400)✅ Works
Smart TVBlocked from NAS✅ Blocked
Monitoring PiCan ping LAN (192.168.1.x)✅ Works
Monitoring PiCannot SSH to other devices✅ Blocked

Key Takeaways

  1. Start with a default-deny approach – Only allow what's necessary.

  2. Use descriptive hostnames – Makes ACLs easier to read and maintain.

  3. Test incrementally – Verify each rule works before adding complexity.

  4. Monitor logs – Use tailscale debug acl to troubleshoot unexpected blocks.

Tailscale ACLs transformed my homelab from "everything can talk" to "least privilege by default"—without sacrificing convenience.


Next Steps

0
Subscribe to my newsletter

Read articles from Mahela Indeewara directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Mahela Indeewara
Mahela Indeewara