Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

7 AWS reviews

External reviews

41 reviews
from and

External reviews are not included in the AWS star rating for the product.


    reviewer2811270

Secure access has simplified hybrid connectivity and has unified multi-cluster workflows

  • March 24, 2026
  • Review provided by PeerSpot

What is our primary use case?

We use Tailscale because we work for so many companies and each company has their own way of allowing their employees to connect to their infrastructure. We use Tailscale primarily for this purpose. For example, if there are Kubernetes clusters and engineers need to connect to the cluster to run their local applications against it, they connect using Tailscale. Additionally, we sometimes establish connections between on-premises and cloud environments. The first case involves ensuring that clients' employees have access to resources such as Kubernetes clusters, and the second case involves making connections between on-premises and cloud infrastructure, which makes it easier to connect.

Let me give you a quick simple example of how I've used Tailscale for one of my clients. One of our clients wanted their engineers to be able to connect to the cluster internally instead of going through the public internet. We introduced them to Tailscale and set up the tailnet in Tailscale. The tailnet in Tailscale enabled us to install a Tailscale operator on each cluster. For instance, if our client has ten clusters, we install the Tailscale operator to expose the subnet router of each environment to the tailnet. Users can connect to the tailnet, and since the subnet router is already exposed to the tailnet, they can have access to their clusters through the subnet routers that are already exposed to the tailnet. This is how they can connect to the Kubernetes cluster. The reason is because we don't want users to connect through the public internet, and in the setup of the Kubernetes cluster, we only allowed one or two specific VPN connections. The only way we can allow employees to connect is through the tailnet. We installed a Tailscale subnet router on each cluster, which exposed the cluster VPC and networks in the tailnet. When employees connect to the tailnet, since the subnet router is already exposed to the tailnet, they can connect through the tailnet.

There is another scenario where clients are trying to access their on-premises data to the cloud. Instead of using a cloud VPN, which would be a headache and could cost a lot, we decided to use Headscale. Headscale is similar to Tailscale because Tailscale is the enterprise version while Headscale is the open source alternative. We set up Tailscale for them on-premises and on the cloud. We set up a Tailscale tailnet on the cloud, and we set up a subnet router on-premises and another subnet router on the cloud. Both subnet routers will connect to the tailnet on the cloud and expose their VPCs. The one on the cloud will expose its VPC to the tailnet and the one on-premises will expose its VPCs to the tailnet. Machines on-premises can connect to machines on the cloud through the tailnet connection. The machine in the tailnet that is on-premises serves as a subnet router, and the one on the cloud also serves as a subnet router that routes traffic from the cloud to the tailnet, while the one on-premises serves as a subnet router that routes traffic from the on-premises to the tailnet.

When a connection needs to be established, for example from the cloud to the on-premises, we create a routing policy that says if you want to talk to a specific IP which is on on-premises, go through the subnet router. The same thing applies with the on-premises as well. If you want to talk to a specific IP on the cloud, go through the on-premises subnet router. This way, it connects to the tailnet which has exposure of the cloud IPs, and the connection is made.

What is most valuable?

I would say one of the best features Tailscale offers is the ACL, the Access Control List. Tailscale has positively impacted my organization very well. We don't have any VPN issues or VPN connection issues typically, and we don't really maintain them. We just make sure the tailnet is available. Tailscale has really helped in terms of security because users can be in another part of the world. Instead of them connecting to the company environment through the local network there, they can switch on their Tailscale and once they switch on their Tailscale, they don't have to connect over their internet; they just go through Tailscale to access company infrastructures. In terms of security, it is very good.

What needs improvement?

I would say that in terms of Tailscale, if I have so many tailnets I need to connect to, there are some issues in the login process that need a little bit of attention from the Tailscale team. Sometimes, you would probably need to restart your entire system for it to connect. As a DevOps as a Service engineer, I have so many clients that are using Tailscale, and I would need to connect to maybe five different tailnets because they are different clients. Client A might have a Tailscale, Client B, Client C, and so on. When changing between tailnets, sometimes it hangs. Sometimes you might need to restart your entire system. This is a bit of a headache in that aspect. However, I believe if you are just using a particular tailnet, just one, then it is quite easy and there won't be any headache. For me, I think it can be improved in the aspect of having multiple tailnets to connect to. A good refresh on the Tailscale side and the backend side to refresh the connection anytime there is a new connection to be made would be helpful. Instead of needing to restart the system, it should be able to refresh itself. The connection side and connecting to multiple Tailscale instances can be problematic, and sometimes you have to restart your system when switching between them.

The ACL sometimes is like another language on its own entirely. It is fine, but they need to make it in a YAML format instead of the current format because it is quite new and something you have to go and study. If they can make it like a YAML format, that would be better.

Aside from the switching which I mentioned and the fact that you have to relearn their ACL, if the ACL could be in a YAML format instead of JSON format, that would be beneficial. I don't think there is much they can do about the switching of tailnets, but if they can have a YAML format of the ACL, that would be good. Every other thing is a ten out of ten. The connection-wise is easy to set up and easy to install. It is good to have things connected all together from on-premises, from so many environments, and even exit nodes as well. It is good overall.

The pricing, I think Tailscale can be a little bit on the higher side. It is not for teams with just small users. If you want to set it up for small users and a small startup, I don't think you can afford it and might need to go to other open-source alternatives. It is good for teams that have maybe fifty plus users or one hundred users. In terms of pricing, I would say it is on the higher side, but it is worth it. The price is worth the functionality. As a user, I would say it is more on the higher side, but based on its functionality, it is worth the price.

For how long have I used the solution?

I have been using Tailscale since I joined CloudKites, which is almost three years now. I would say three years.

What do I think about the stability of the solution?

Tailscale is very stable. I haven't had any issues with it, and it has always been stable. It is good.

Tailscale is a SaaS platform, so Tailscale scales it themselves. This is why, as I said earlier, I don't have any issues with stability, as it scales on their end. However, if I am installing a subnet router, scaling it is also easy. You probably just need only one pod or one node to expose your VPC or your network to the tailnet. In terms of scalability, there is no issue there. It is a ten out of ten.

How are customer service and support?

Tailscale customer support is cool, but we miss the human interaction. The support is all right.

Tailscale customer support is very good. They always want to help every time. I would give it a ten out of ten.

Which solution did I use previously and why did I switch?

Previously, we have used a cloud VPN. I think it can be a little stressful, especially if you have so many environments to maintain. It is not combined into one. If you have ten clusters, you have to maintain them individually. There is no single interface where you can manage all ten cloud VPNs; you have to be managing them separately.

As I mentioned, we have explored cloud VPN. There is another one I have heard about which is NordLayer. I haven't tried it, but I think it is just purely a VPN. It is not something that you can use to expose subnet routers, exit nodes, and other features that Tailscale offers. I think it is just a pure VPN. Personally, cloud VPN is the only one we have explored, but it does not have enough capabilities compared to Tailscale.

What was our ROI?

I think Tailscale has shown a return on investment in terms of time saved because it is a SaaS platform. It provides time savings instead of maintaining a VPN. You just make sure you have a Tailscale account, then you install the subnet router or exit node on any of the environments you want to use it on. You just set them up and you should be good.

What other advice do I have?

I would tell others looking into using Tailscale to go ahead if they can evaluate their infrastructure setup or how they want employees to access that infrastructure, and if they have their finances for it, then sure, you can go. Tailscale is a very good product for companies and teams generally, particularly for infrastructure, DevOps teams, and developer teams. It is very good for them. They should go ahead and use Tailscale. However, if money is going to be an issue, they can look into open-source products. However, with open-source products, you still have to maintain the infrastructure on how you set up the tailnet. Aside from that, go ahead with Tailscale if you don't want to manage the infrastructure of your entire tailnet. Just use the normal Tailscale product.

Personally, I don't really have much other improvement to suggest. It is cool the way it is. Aside from the two things I mentioned regarding ACL format and multiple tailnet switching, Tailscale should be solid.

I don't have much else for Tailscale. I just think it is a good product for people to use, especially if they want to make sure the connectivity is secured, and if you want to establish connections in many ways that are possible. Overall, I give Tailscale a rating of eight out of ten.


    Abdelghafor Elgharbaoui

Secure access to kubernetes services has become seamless and has simplified my daily work

  • March 24, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case of Tailscale is for creating a VPN between Kubernetes services in Oracle Cloud, other servers, and my PC to connect with them, and I also use it to expose some services, so instead of port forwarding some services of Kubernetes, I use Tailscale, which makes things very easy and usable.

Regarding exposing services, I use Grafana and for Tailscale, I expose that service so I can access it through the VPN instead of port forwarding the service. I also use it to expose a Kafka UI service, and I use Kafka in my job.

What is most valuable?

The best feature I like in Tailscale is the Tailscale operator, which is a very intelligent way to connect your Kubernetes cluster with any other device.

In my job, Tailscale has reduced the amount of work and headache of having a VPN between servers and cloud, so instead of following a longer and complex process of having a site-to-site VPN and a device with a fixed public IP to connect with the cloud and other spots in Morocco, especially in Tangier, Tailscale simplifies all of that.

It reduces work, so I was supposed to have a complex job that requires technical knowledge to do some networking tasks, but Tailscale provides a very straightforward solution to avoid a lot of work.

What needs improvement?

I still do not have any issues in mind that need improvement, but if I think about a new feature or something to be improved in the future, I may share it with you.

For how long have I used the solution?

I have been using the solution for about seven months.

What do I think about the stability of the solution?

Tailscale is very stable in my experience.

What do I think about the scalability of the solution?

Tailscale's scalability is actually so good; I have not faced any downtime or issues, so every time I use Tailscale, I get what I expect.

Which solution did I use previously and why did I switch?

Before Tailscale, I used Headscale, which is an open-source implementation of Tailscale. I deployed Headscale to avoid dependencies, but it had many downsides; it did not have an operator for Kubernetes and needed many features, so Headscale was not enough. I also used OpenVPN, but it does not have the integrations and intelligence that Tailscale has, so I am satisfied with Tailscale and I will continue to use it for many months.

I evaluated Headscale, but it was not enough compared to Tailscale.

What other advice do I have?

I think it is a very good solution; however, I think a ten is something very perfect, and I feel Tailscale has many things to do in the future, such as getting more integrations into other things.

For others looking to use Tailscale, I want to tell them you will not regret it ever; Tailscale is a very good and useful solution.

I think it saves me time and money since the current tier I use is the free one, so it saves money and time, and that is good. I give this review a rating of eight out of ten.


    reviewer2811189

Remote access to home media and DNS has become simple and now connects all my daily devices

  • March 24, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Tailscale to connect from outside my local network. I set it up on my server and on multiple clients, including my smartphone (iPhone), laptop, MacBook, and TVs, as well as my parents' TVs which are far from my home. Basically, all the devices that I use to connect to my server.

For the most part, I use it to connect to my media server, which contains a collection of media. I also use it as a DNS server. Since my server has DNS, it spreads to all the devices which I am connected to.

I also use it to connect via SSH to start other clients via Wake-on-LAN. I have been using it every day since June 2025, and it has never given me a problem. I also contacted support for some questions, and the support was great. I am actually really impressed by the product and its support.

What is most valuable?

The features that I love the most are the simplicity of setting it up. I can do it in about two minutes. I just download the app on the client, use a QR code or a key, and set it up. Another feature is Tailnet, which allows me to manage the devices and organize them.

Because I have been using it since June 2025 and never used it before, coming from a very basic level of knowledge, it was really simple to learn and set up. For me, using Tailscale on all my devices is a definite choice.

What needs improvement?

I do not think there is anything that I wish would have been better because, honestly, for my use case, it has everything I need. I read that people complain about the maximum number of users that can use it under one account, but that is not my use case. For my use case, it has nothing more that I need. It has everything, and it is perfect for my use case.

For how long have I used the solution?

I have been using Tailscale since I built my home server, which was in June 2025.

What do I think about the stability of the solution?

Tailscale is really stable.

What do I think about the scalability of the solution?

Until now, with 20 devices, I still have not encountered any limitation. There is no limitation for now.

How are customer service and support?

I only used customer support one time to ask a question that I do not remember, honestly, but the customer support is really great since they responded really quickly and provided very explanatory answers.

Which solution did I use previously and why did I switch?

At my home, I never used any other service, but in my previous job, I used OpenVPN. However, it was already set up. I did not know how to set it up. It was a bit more problematic because it had connection problems, but I do not have much experience to analyze and talk about it.

How was the initial setup?

Setting up a Tailscale environment took me maybe 10 minutes on the server and two minutes for every device. With about 20 devices, I set up all my environments in about an hour. If I had to use another VPN service, for example WireGuard, I can assume that it would have taken me far more than an hour, something like two hours at least. That is double the time, and Tailscale takes half the time to set up.

What about the implementation team?

We were really engaged with this product. We talked about everything in my opinion, so I do not think there is anything that I would like to add to Tailscale.

What was our ROI?

As I said, I only use the basic license, so I cannot give any metrics on ROI. But if I had to think about a company or an organization that uses it, I would think that it surely gives a good ROI since it is really a good application and a good service.

What's my experience with pricing, setup cost, and licensing?

Until now, all costs have been free. I never used a license. I never purchased or bought anything more than the basic free license.

Which other solutions did I evaluate?

I evaluated WireGuard, which I know is the base of Tailscale, but I chose Tailscale since it is more simple, as I said during this interview. That is the main and only reason I chose Tailscale over WireGuard bare metal.

What other advice do I have?

For my use case, these are the main features that I use and have discovered so far. I do not think I have anything more to add in this area.

I would say to use it because, in my case, it really helped my organization with my setup. I would really suggest people use Tailscale if they ask me. I rate this product a 9.


    Hamza Rahman

Secure remote access has simplified daily device management and streamlined network operations

  • March 23, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for Tailscale is to provide a VPN service where we can remotely log in or SSH into other devices on our network on Tailscale. We're using Headscale. We use it to perform updates, send information, ping certain cameras, and connect devices.

The company did use ZeroTier before, but we chose Tailscale for this use case because it has definitely been the better option of the two, providing faster service and easier installation.

I believe I have covered everything about our main use case. Tailscale is a very solid framework and is very useful for smaller companies if they want to start out or even bigger companies who want to have a robust network of devices that they want to manage.

What is most valuable?

The best features Tailscale offers are the web interface that allows you to see all of the networks, all the IPs that are active and whether they're offline or online. It is very useful when you have a lot of customers and different devices in different areas. The network connectivity feature is the best.

The web interface and network connectivity features help me in my day-to-day work because we can SSH into the device without knowing the public IP or having any other remote RDP services on that device. If we have the Tailscale IP, we're able to get into that device just as if it were on our LAN or as if it was wired. We use this capability day-to-day for devices all across the U.S.

Tailscale has positively impacted our organization by creating a streamlined appearance, and it is definitely apparent that it is one of the backbones of the company. Currently, if Tailscale goes down, our services are not operable. This has happened in the past but has been fixed multiple times. The newest version has fewer bugs than before.

I don't have specific metrics, but I definitely feel it is a lot faster going through the tickets using Tailscale and being able to troubleshoot on the network of the devices.

What needs improvement?

Tailscale could be improved by having a better way to troubleshoot. Sometimes our devices do go offline, but if we are able to have some sort of command where we can instantly turn off and turn back on the services at the IP, that would be great.

I believe that covers the needed improvements; it is already a pretty smooth experience.

For how long have I used the solution?

I have been using Tailscale since I started my career, which was three years ago.

What do I think about the stability of the solution?

Tailscale is stable in my experience.

What do I think about the scalability of the solution?

Tailscale is definitely very scalable. We haven't had any problems with our scalability, as we have over 300 to 400 devices that use Tailscale that we connect with and utilize on a daily basis.

How are customer service and support?

I have not personally reached out to customer support, but I believe my manager may have when it went down one time.

Which solution did I use previously and why did I switch?

We did use ZeroTier before; that was before I was employed, but some of our devices still have it installed. They marked up the price significantly, so we did not continue with them.

How was the initial setup?

We deploy Tailscale on a private cloud using Headscale, and we use DigitalOcean to host the Headscale server so that we can use Tailscale on all the devices and connect them. We install Tailscale on the device and log in.

What was our ROI?

I haven't seen a return on investment with Tailscale based on metrics because we are not big enough to have the metrics or have time for the metrics, but on a personal note, it seems faster and is very streamlined.

What other advice do I have?

I would tell others looking into using Tailscale to get it and use it. If they need an enterprise-level network, it is definitely one of the best solutions.

I was not involved in decision-making before choosing Tailscale; I am just utilizing the software, so I did not come up with the solution of Tailscale.

I rated this review a 9 out of 10.


    reviewer2811057

Secure remote access has transformed how I manage church servers and homelab devices

  • March 23, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Tailscale is remote access to devices across networks.

In my church context, I can give you a quick specific example of how I use Tailscale for remote access: we have a Reolink doorbell that I access over the local network via the Reolink client apps or MPV, and it also has a cloud solution that is slow and unreliable. I use Tailscale to remotely connect to the doorbell and its NVR, and it is quick, nice, smooth, and great. Another example is in my homelab, where I have many devices in a rack, and I use Tailscale to connect to any of them for fast, reliable access since they can all be in one Tailnet. In the church context, I can use subnet routing to fully expose the entire subnet that the doorbell is on and access various other server computers remotely.

In the church context, I have a number of server computers running virtual machines on a Proxmox device, and I generally SSH into the Proxmox host or the virtual machines through Tailscale when I am outside of the church network. Tailscale gives me a list of all devices on the Tailnet, making it easy to copy the IP addresses and access everything flawlessly.

What is most valuable?

I would say the best features Tailscale offers are ease of use and ease of remote access. Compared to Tailscale's competitors that I have tried, such as ZeroTier, Tailscale allows you to access a device from another place in significantly less time. Tailscale is very fast, and WireGuard as a protocol is a great choice for a VPN solution because it is so quick, making things such as game streaming over Tailscale easy and fast.

Tailscale's security is fabulous, especially the access control features and the ability to use existing OAuth accounts for access. The user interface is very sleek and not cluttered, which I appreciate when I am on a device with a graphical interface or a command line interface. There are a couple of quirks with the command line interface that I believe are intentional design choices for the best.

Tailscale has positively impacted my organization by making the previously unusable doorbell with the cloud solution fast and reliable for remote access. Previously, conversations through it would be stuttery and hard to understand, with periods of no video feed. Tailscale fully fixed that issue. Accessing servers is easier, allowing me to SSH into the hypervisor or virtual machine seamlessly whenever I need to improve a feature or fix downtime issues. Tailscale managing the security for these critical functions is a beneficial aspect.

What needs improvement?

I do believe there are a couple of features and changes I would like to see with Tailscale. I initially got introduced to Tailscale in high school when I needed access to services running on my server, but due to deep packet inspection being in place, I could not use Tailscale. Tailscale's free plan effectively introduces people to the service, but I would love to see an anti-censorship VPN protocol implemented. When accessing my homelab, I usually have to resort to using VLESS host through 3X-UI, which is complicated. I would like Tailscale to provide more censorship-resistant options, such as Shadowsocks or VLESS, as fallback protocols.

I would like more anti-censorship protocols, such as VLESS or Shadowsocks, so I can effectively use Tailscale in environments with censored internet access that block WireGuard through deep packet inspection.

More anti-censorship VPN protocols are the main improvement I wish for. If Tailscale implemented these, I would use it for all my VPN needs and would likely use Tailscale entirely.

For how long have I used the solution?

I have been using Tailscale for five years.

How are customer service and support?

The user interface, documentation, and support for Tailscale are fabulous, and I have no complaints about the user interface. I might prefer a TUI instead of a CLI because I am often not using graphical applications, but the CLI is satisfactory. Overall, the interfaces are great, and the documentation is straightforward for setting up Tailscale on server devices. I only need to reference documentation for specific features such as enabling subnet routing.

What other advice do I have?

My advice to others looking into using Tailscale is to do it; it makes remote access much easier.


    João Guedes

Remote access to my home network has become seamless and now simplifies daily management

  • March 22, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Tailscale is accessing my home network when I'm outside. Essentially, it functions as a VPN.

I use Tailscale to access my home network by connecting to a main machine that runs Tailscale, which is separate from my home server. This allows me to connect to it even when my home server goes down, and it serves as a subnet router so I can access my home network through that single machine instead of connecting every single virtual machine to the same Tailscale network.

What is most valuable?

In my opinion, the best features Tailscale offers are its ease of use and quick setup. You essentially just need to run a command and you're connected to Tailscale network, and I love MagicDNS as well. Ease of use, MagicDNS, and the subnet router capabilities are very good.

I appreciate that MagicDNS helps me avoid memorizing IP addresses, and the subnet router allows me to use one device to connect to the entire network. For example, if I have a smart TV that cannot install Tailscale, I can access it through my subnet router machine. I set it up this way because I only have Tailscale installed on that entry point machine, which serves as the gateway to my network.

Tailscale has made managing and accessing my home network easier compared to using OpenVPN before. Previously, I had to manage everything myself, run the server, and keep it operational. If the server ever went down, I couldn't access my home network. With Tailscale, the situation is similar, but I don't have to expose any ports; I just connect a device to Tailscale servers. The main difference is that I don't have to run the VPN server since Tailscale does it for me, connecting my devices through their service. It's really great that I don't have to worry about all the setups.

I appreciate how their login system works. Tailscale services are fast, and since processing is done on the clients rather than the servers, they can focus on providing a good, reliable service. I don't think I've ever faced downtimes or connection issues from another country.

What needs improvement?

Tailscale does a great job for free-tier users, and the 100 device limit is very fair. However, I think improvements could be made in the support for UI clients, especially on Linux machines. In Windows and macOS, the UI support is good, but Linux is more customizable and has a unique setup, and I feel like I never have a good UI to interact with when using Linux desktops, which is unfortunate.

For how long have I used the solution?

I've been working in my current field for about four years.

What do I think about the stability of the solution?

Tailscale is stable for me.

What do I think about the scalability of the solution?

I feel Tailscale would handle adding more devices or users in the future easily, and I am confident of it. As a free-tier user, I have tested my limits, connecting the maximum amount of devices, and everything performed great. After that, I switched to subnet routing, allowing one device to forward traffic into my home network, which also circumvented device limits.

How are customer service and support?

I never interacted with Tailscale's customer support because I never needed to. Tailscale is that reliable, and their documentation answers any questions I have.

Which solution did I use previously and why did I switch?

I previously used OpenVPN before switching to Tailscale. I liked OpenVPN, but setting it up in a production environment was more of a learning experience rather than a complete permanent solution. You always find yourself wondering what improvements could be made. While OpenVPN is fine for production use, I'd say a managed service is more professional because it provides guarantees and reduces concerns. I switched to Tailscale out of curiosity, wanting to try WireGuard, and I was sold after just one to two minutes of setup.

Before choosing Tailscale, I evaluated other options, including OpenVPN. I was familiar with running my own VPN solution and considered using WireGuard directly on my home network or opting for Tailscale, which uses WireGuard in the background. I wanted something that worked correctly the first time, so I chose Tailscale while planning to tinker with WireGuard later.

How was the initial setup?

My advice for others looking into using Tailscale is simple: just do it. Spin up a virtual machine, run the one-line command that Tailscale provides, and see how it works because it's so intuitive that nobody can mess it up.

What was our ROI?

I've seen a return on investment with Tailscale in terms of time saved and less maintenance required. I learned a lot from installing and maintaining OpenVPN, which sometimes required extensive hands-on configuration and problem-solving. With Tailscale, I set it up and forget it because it just works, allowing me to avoid worrying about the whole VPN aspect of my home network architecture. Every return on investment with Tailscale is time saved and reliability from the managed service.

What's my experience with pricing, setup cost, and licensing?

I wouldn't say I have an experience with pricing, setup costs, or licensing because I use the free tier. My needs have never exceeded the free tier as I am the single maintainer of my home network and server, which is beneficial.

What other advice do I have?

I think Tailscale is an awesome product; I use it every day and have it implemented in my home network. As long as the free tier stays the same, I don't see myself switching from it.


    Uaman Asad

Secure remote access has simplified managing my home lab and private services for family sharing

  • March 22, 2026
  • Review from a verified AWS customer

What is our primary use case?

Honestly, my main use case for Tailscale is my home lab and being able to access my home network devices using a Zero Trust platform that's fully secure. It has been so useful, especially for sharing some of my self-hosted services with family and friends.

For example, I use Tailscale in my home lab by having it installed on all of my devices, like my personal laptop and PC, as well as on my servers. On my servers themselves, let's say I'm hosting a web page on port 3000. I could just use my Tailscale MagicDNS name and then the port, or I could just use the Tailscale IP and the port to access those web pages. So for example, I host things like VIQUINIA and some other things I can easily access. Another use case that I have for Tailscale in my home lab is I have it installed on my firewall, which is built with OPNsense. What I do is I have it set as an exit node and I also broadcast my entire subnet. So that way, it's as if I'm connecting to a regular VPN and have access to my full home network, not just the devices that have Tailscale installed on them. I can also funnel my traffic through my home network if I'm elsewhere. Since I have my own custom DNS set up, if I am using my network as an exit node, I get free ad-blocking wherever I go.

For my organization, we use Tailscale for our database as a secure way to access our VPC. It's really great. It's an easy way for everyone to connect and disconnect. Nothing clunky, nothing being left behind, very lightweight, very nice UI, and very useful. For my home lab, it has been great because there are services you want to host, but you don't want to expose them to the public network, and using Tailscale gives you a very nice way of actually accessing that without having to deal with exposing things to public ports. I also really appreciate Tailscale services, which I forgot to mention, which involves hosting a service on Tailscale itself.

Regarding metrics, I guess a lot of times it saves hours. Sometimes I forget something at home and if I use Tailscale, I can easily access my network and grab it, whereas usually I would have to drive back home. I feel that in itself is really huge.

What is most valuable?

The best features Tailscale offers are their free tier, which is amazing. Whatever it provides, I feel it's a very good amount for what it gives you. I would honestly even be open to paying if my needs expand from what I am currently using. I feel the Zero Trust networking thing is really great. I feel the ability to also integrate Mullvad VPN into your own Tailscale network and use that as an exit node is huge. It makes a very nice, seamless experience for VPN. Rather than having multiple clients, you just use Tailscale and that handles everything for you. I also appreciate the Tailscale drop feature. I feel that's very unique, kind of a global AirDrop with anything that has Tailscale. So it's a really simplified way of sharing files, not only over your local network, but over your Tailscale network, your virtual cloud.

A unique thing that I did, which at the time was an experimental feature, but now I believe it's fully out and available, is using Tailscale files. Essentially, I had a bunch of space on my server and I made a Tailscale share. So now if I ever go on any of my devices, I have a whole file section which I can actually just drag and drop to that location and it's kind of a shared Google Drive. Any of the old storage I had lying around, I was able to convert it into my own free cloud storage.

I would say I rely on just the regular Tailscale Zero Trust network the most in my daily workflow. I feel I have that on all the time and I'm accessing things when I'm not at home. Usually, when I'm traveling, it's when it's the most useful, but if I'm staying at home and working from home, it's not as useful because I'm connected to my same network. But for example, if I'm at my in-laws' house or if I'm outside at a library or coffee shop, it's very useful to have.

What needs improvement?

I feel the speed of the control servers are a bit too slow. I feel that's the main bottleneck right now for Tailscale. For example, at my apartment, I can do 2-gig networking, but when I connect via the exit node, and I'm wired in somewhere else, and that place also has 2-gig networking, I'm at max getting half of my speed. The main bottleneck here is really the control servers and the throughput of data.

I feel Linux needs its own UI client. I had to use a custom third-party one. That is a big thing as well.

To make it a 10, I mean, have better support for Linux. That's probably the main thing, honestly. Fix the DNS things too. There's some issues where I should be able to use my own custom DNS easily and then when you move MagicDNS starts causing problems, I should be able to just have my own custom DNS that links directly into Tailscale and assign each thing its own specific hostname. I feel that doesn't work as well as expected, or maybe you do provide that, but then it's kind of obfuscated through weird documentation.

For how long have I used the solution?

I have been using Tailscale for about two years or a year and a half.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

Tailscale's scalability is good.

How was the initial setup?

It has been a really great product. Ever since I started using it, I got my family members to get on it and so many other people, and I very openly recommend it.

Which other solutions did I evaluate?

I looked at Netbird or something before choosing Tailscale.

What other advice do I have?

I advise others looking into using Tailscale to start faster or look at the documentation.


    Ahamed Shadhir

Secure hybrid access has simplified remote work and has reduced traditional VPN overhead

  • March 02, 2026
  • Review from a verified AWS customer

What is our primary use case?

I have multiple use cases for Tailscale. My primary use case is providing secure remote access to internal servers, cloud workloads, and development environments without exposing services to the public internet. Tailscale replaces traditional VPN solutions and enables secure device-to-device connectivity using a Zero Trust networking model.

We deployed in a hybrid model connecting on-prem servers to private network resources with workloads in the public cloud, allowing secure access across environments without exposing services to the internet.

What is most valuable?

The most valuable features are the Zero Trust architecture, peer-to-peer connectivity using WireGuard, easy deployment and setup, access control for granular permissions, single sign-on, subnet and routing, exit nodes, and cross-platform support.

I rely mostly on subnetting and routing in Tailscale because it allows seamless access to internal network resources without installing clients on every device, which greatly simplifies daily operations and improves workflow efficiency. Tailscale stands out for its simplicity and fast deployment with strong identity-based security, which makes it both easy to manage and highly reliable for everyday use.

Since implementing Tailscale, we have seen improved remote access reliability, reduced VPN maintenance overhead, faster onboarding for new users, and stronger security through identity-based access controls, all while significantly lowering the administrative workload.

What needs improvement?

Tailscale could be improved with more advanced network visibility and monitoring tools, cleaner pricing tiers for scaling teams, and enhanced built-in reporting for device posture and controls for enterprise environments. I would like to see Tailscale offer more intuitive access control list management for large environments, deeper analytics for traffic insights, smoother troubleshooting diagnostics within the admin console, and more flexible pricing as device and user accounts grow.

I would rate Tailscale an eight out of ten for simplicity, strong security model, and ease of deployment, with minor improvements needed in enterprise-level visibility and pricing flexibility.

For how long have I used the solution?

I have been using Tailscale for the past two months.

What do I think about the scalability of the solution?

The scalability is straightforward and easy to use, but based on the device count, the cost increases.

How are customer service and support?

Customer support is good, and I have nothing to complain about.

Which solution did I use previously and why did I switch?

Previously, we used an IPsec-based VPN solution, which we switched to Tailscale because managing VPN servers, firewall rules, and user access became time-consuming and complex. We needed a simplified, more scalable Zero Trust approach for remote and cloud-based access.

How was the initial setup?

The initial setup has been straightforward and predictable with the per-user subscription model and no infrastructure or hardware setup cost, making the initial deployment inexpensive.

What about the implementation team?

Since implementing Tailscale, we have seen clear return on investment by eliminating VPN server infrastructure costs, reducing remote access server setup time from hours to minutes, cutting VPN-related support tickets by around forty percent, and saving several information technology administration hours per week previously spent on firewall rules and connection troubleshooting.

What was our ROI?

We have seen clear return on investment since implementing Tailscale by eliminating VPN server infrastructure costs, reducing remote access server setup time from hours to minutes, cutting VPN-related support tickets by around forty percent, and saving several information technology administration hours per week previously spent on firewall rules and connection troubleshooting.

What's my experience with pricing, setup cost, and licensing?

The setup has been straightforward and predictable with the per-user subscription model and no infrastructure or hardware setup cost, making the initial deployment inexpensive. However, the cost increases as user and device counts grow, especially when advanced features are required.

Which other solutions did I evaluate?

Before selecting Tailscale, we evaluated alternatives such as ZeroTier, OpenVPN, and native VPN options within Amazon Web Services. We chose Tailscale for its simplicity, faster deployment, and strong identity-based Zero Trust model.

What other advice do I have?

My advice to others considering Tailscale is to start with a small pilot deployment, carefully design the access control list policies from the beginning, integrate with your identity provider early for better security control, and test subnet routing or exit nodes to fully understand how it can simplify your remote and cloud access architecture. I rate this product an eight out of ten overall.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    AKSH D.

Familiar, Flexible UI That’s Easy to Use

  • February 17, 2026
  • Review provided by G2

What do you like best about the product?
It’s easy for me to use, and the software feels very familiar. The dashboard and overall UI are easy to understand, and they’re flexible as well.
What do you dislike about the product?
Almost everything is fine, but there’s one thing I really dislike. The free plan is okay, but the Teams plan is very expensive, and as the number of users grows over time, the cost will increase as well. Aside from that, everything is fine.
What problems is the product solving and how is that benefiting you?
With Tailscale, we can now safely access servers, internal tools, and systems from anywhere. It also feels very secure and easy to lock down. For our team, it has reduced IT management effort and saved us time.


    AKSH D.

Reliable Remote access Solution, Easy to Use

  • February 16, 2026
  • Review provided by G2

What do you like best about the product?
It's easy to use for me. And Very familiar Software. Dashboard and all Ui are easy to Understand.
What do you dislike about the product?
Almost everything is FIne but one thing I hate is about for free plan is fine but teams plan is very high chargable and as time number of users is grow, cost will also increase. so apart from that, everything is fine.
What problems is the product solving and how is that benefiting you?
Through tailscale, now we can safely access servers, internal tools, and systems from anywhere. It's also very securable. and also For our team, it reduced IT management efforts and saved time.