Overview

Product video
Tailscale provides end-to-end encrypted networking across platforms, providers and infrastructure. With its zero-configuration setup, it replaces legacy VPNs, powers Zero Trust Network Access (ZTNA), and supports Secure Access Service Edge (SASE) initiatives by streamlining software-defined networking and security operations. Identity-Based Access Control: Manage network access with user and service identities, not just IP addresses. Integrates with Google, Microsoft Entra ID, Okta, and other leading identity providers for intuitive access control. Flexible Topology: Transition to a zero-trust architecture and define your network as needed peer-to-peer, mesh, or subnet-connected. Avoid single points of failure with Tailscale's decentralized architecture. Resilient Networking: Ensure connectivity even across NATs, firewalls, and network changes. With MagicDNS and static IPs, your devices are always addressable.
For Enterprise pricing, a custom EULA, or private contract, please contact aws-marketplace@tailscale.com for a private offer.
Highlights
- Fast Deployment: Start in minutes without re-architecting your network.
- Secure-by-Default: End-to-end encryption, no visible traffic, and API keys that expire automatically
- No Single Points of Failure: Decentralized, peer-to-peer connectivity for low-latency and high-resilience networks.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/unit |
|---|---|---|
starter | Starter (per active user/month) | $6.00 |
premium | Premium (per active user/month) | $18.00 |
Vendor refund policy
All fees are non-cancellable and non-refundable except as required by law.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products

Customer reviews
Secure access control has simplified global developer connectivity and protected internal services
What is our primary use case?
My main use case for Tailscale is to whitelist connections using the exit node to whitelist certain connections to public addresses. I also use it to access internally exposed load balancers and to gatekeep certain services within the VPN.
For accessing internally exposed load balancers or whitelisting connections, we may have a GKE Kubernetes cluster set up with an authorized network, meaning access is restricted to authorized networks and a VPN Gateway IP that can only access it from the public internet. To give a developer access to the internal IP of the control plane without exposing it publicly, we install a Tailscale operator in the cluster. Once the Tailscale operator is installed, we expose the internal IP of the cluster through one of the pod operators as a subnet router. When developers connect their Tailscale client, they can access the cluster locally without routing through the public internet.
Tailscale can also be used for whitelisting. For instance, if we have a service in the Kubernetes cluster exposed externally through Traefik, NGINX Ingress, or a Gateway and certain users need access, we can set up exit nodes for different regions. If we have users in Europe and users in America, we can set up an exit node for users in America and another for users in Europe. These exit nodes have external IPs that we can use as a whitelist in our externally exposed services. When traffic comes from those external IPs, it is allowed through. When a user connects their Tailscale client and enables one of the exit nodes, they can access the externally exposed address since it is whitelisted to those external IPs. If their Tailscale client is not connected and the exit node is not enabled, they cannot access the externally exposed service.
What is most valuable?
The best features Tailscale offers is that the access control list is good. We can separate different kinds of connections even within the tailnet, allowing developers to connect to certain IPs and services, with engineers having different access levels. Tailscale is fast as well.
The access control lists help my team by allowing us to control who accesses our services. For instance, we have some services on developer clouds where only certain users can connect. Those developer clouds are on our VPC, which is exposed with tailnets. Developers must connect to Tailscale to access the tailnet and developer cloud already exposed to the tailnet. We created groups with certain users and administrators who can access government clouds. We only have to give those groups access to those government cloud IPs, while every other developer cannot access the government cloud IP because the ACL controls this.
For speed, we can use the same ACL . If we only expose certain cluster addresses to certain developers, we open the dev cluster's local address to the developers. In some cases, we want to ensure the security team can access the cluster locally to perform audits. We can grant the security team access to the cluster in the ACL. This works very fast. With just the configuration required in the ACL, within a few seconds, we can see the access reflecting for the security team, and they have access.
In terms of how Tailscale has impacted my organization positively, it is good for security on the network side of things. It helps us connect properly. Because our company is remote globally, even if someone is in Australia and needs to connect to a cluster or any services, instead of routing through the public internet and exposing the traffic there, we can connect internally through Tailscale tailnets, and everybody is working.
What needs improvement?
Tailscale can be improved, especially with logging in. I have two tailnets, for instance, one for personal use and one for my company organization. Sometimes trying to log out of a particular tailnet and connecting to the company's Tailscale tailnet is challenging. Especially if you have been logged into one of those tailnets for a long time and want to log into another one after a few days, the login process can be tricky. Sometimes I have to restart my whole system to ensure that after I log out from one tailnet, I can effectively log into another one. The process is not as smooth as I would imagine, especially if it has been a while. We have to log out and sometimes even switch off the entire system and log back in.
I choose eight out of ten because there are other improvements that can be done with the logging. I am not a fan of the ACL in its current format. It is a JSON ACL, and perhaps if it were in YAML format, that would be better and more readable.
Aside from the logging side of things, everything is straightforward with Tailscale. The ACL can be improved by converting it from JSON format to YAML format for better readability.
For how long have I used the solution?
I have been working in my current field for three years. I have been using Tailscale for close to three or four years.
What do I think about the stability of the solution?
Tailscale is stable.
What do I think about the scalability of the solution?
We are using Tailscale at the SaaS level, so we do not scale it locally. We do not install it on premises.
How are customer service and support?
Tailscale's customer support is good and very responsive. I would rate the customer support a ten.
Which solution did I use previously and why did I switch?
Before Tailscale, we used a normal VPN like GCP Cloud VPN, for instance, which was adequate but had limitations.
What was our ROI?
I have seen a return on investment in terms of time saved and security. Time saved and security provide good returns.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the pricing side of things as I am an administrator who controls Tailscale and ensures developers have access. The pricing is mostly handled by the IT and accounting team. Based on what I hear from them, it is a bit costly and can be on the expensive side.
Which other solutions did I evaluate?
We went for Tailscale straight away without considering other alternatives.
What other advice do I have?
The advice I would give to others looking into using Tailscale is that it is good for developers. Tailscale is deployed in our organization on public cloud and Kubernetes clusters. We do not have a hybrid or private cloud setup. We have it mostly on public clouds. The UI of Tailscale looks good and is not problematic. I rate this review eight out of ten overall.
Secure access to home servers has transformed how I work with local models and client projects
What is our primary use case?
My main use case for Tailscale is the accessibility and simplicity that it offers me to access my servers from anywhere, as well as my local computer and local LLM models. I can access them from anywhere on the network. When I'm doing testing, developing, or handling sensitive data that I don't want to be in the cloud, I can always access my home setup and process the data as required. Additionally, when I was setting up my Kubernetes cluster, I considered Tailscale as a solution for the interconnectivity between the bare metal node and the Oracle virtual machines that I have, which are isolated.
Tailscale helps with accessing my local models and sensitive data due to the simplicity of setting up everything. Even for non-technical people, it's easier to set up. I have my setup with my phone, my laptop, and my servers connected. When I need to work with a client or as a consultant, if they are remote and don't have the technical capabilities to access their infrastructure network, it is as simple as that. I just send them a script showing how to install and what to click to join my Tailscale organization. Then I have access to their system easily.
Tailscale has made things easier for presenting, setting up, and sharing files. When I'm working on a project or building an application in React and want to present the UI, even though it's locally hosted, I can serve it on Tailscale and share the Tailscale link that is accessible from the public so the client can see the work in progress. It has also been useful to use the serve feature for sharing files. If I need to share a specific larger file, I would put it on a share and send the link to a friend or coworker so they can download the file. When the process is finished, I can simply stop the sharing.
What is most valuable?
My opinion about the best features Tailscale offers includes accessibility, simplicity, the file serve feature, and the ability to share internal routes. I can set up access to anything at home. Tailscale will advertise the routes inside the network so you can reach any part of the network without any issues, and it provides the control to isolate everything. I also see they have a new feature called lockout that I want to try.
Tailscale has positively impacted my organization with shorter time for setting up connections and improved accessibility. Even when a non-technical person needs help, I can assist them much faster than explaining the process to them.
What needs improvement?
I don't have any particular ideas or additions about the features. It was nice for the service discovery that I used in the cluster because you can connect and use auto service discovery, but I haven't implemented that much because the complexity of the networking that I have sometimes caused issues.
I haven't thought much about how Tailscale can be improved.
For how long have I used the solution?
I have been using Tailscale for something more than two years.
What do I think about the stability of the solution?
In my experience, Tailscale is stable.
What do I think about the scalability of the solution?
Tailscale's scalability is great.
How are customer service and support?
I find Tailscale's customer support to be good.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
What was our ROI?
I cannot provide input on whether I have seen a return on investment with Tailscale since I used the free version.
What's my experience with pricing, setup cost, and licensing?
I'm using the free version of Tailscale, so I didn't have any experience with the pricing.
Which other solutions did I evaluate?
Before choosing Tailscale, I evaluated other options by looking at Teleport but for a different solution. For networking mainly, I use WireGuard tunnels, which are peer-to-peer connection point-to-point.
What other advice do I have?
My advice to others looking into using Tailscale is to try it. It's simple to set up and simple to connect your applications from anywhere. I would rate this product an 8 out of 10.
Private branches and remote devices have become accessible and stay connected for daily operations
What is our primary use case?
I use Tailscale to share the branches in one network to make a site-to-site VPN. I have customers, and each customer has a server with too many branches. We need to access some devices that are not connected directly to the network, such as fingerprints that cannot have any firmware to install, for example, Tailscale agents. I need to connect the branch with the headquarter office and use Tailscale commands to reach the fingerprint through this VPN site-to-site.
This is the main purpose for using Tailscale until now, and I am searching for the other properties and features of Tailscale.
What is most valuable?
Tailscale is fast and easy to install. I can install Tailscale on any operating system, as it has a lot of OS versions and supports Linux, Mac, Android phones, Apple iOS, and Windows. This feature is suitable for my daily jobs and tasks.
Tailscale has a great interface that is friendly and acceptable. Tailscale fixed the problem with reaching devices such as fingerprints, and it is now the most preferred way to connect the site-to-site VPN when we have a customer with fingerprints.
Tailscale is good in troubleshooting, and it takes no time.
What needs improvement?
One of the most significant issues I faced is that in some countries, when I access my Tailscale account, it gives me more steps to verify and confirm, such as sending a message to my mobile and entering the code. I can see this is not helpful for the user experience compared to other alternatives.
Another issue is that when I use Tailscale with other alternatives such as Radmin and ZeroTier , it takes high priority and takes all the incoming connections, even if the other alternative has a different IP scope. It still takes the control and tends to cancel the other software as a VPN site-to-site.
Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.
For how long have I used the solution?
About one year.
What do I think about the stability of the solution?
Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.
What do I think about the scalability of the solution?
Tailscale is good, and I can add any number of branches I need until now.
How are customer service and support?
Tailscale customer support is good. I can contact them and receive a fast response.
Which solution did I use previously and why did I switch?
I still use other tools such as Radmin and ZeroTier . In previous years, I used to use Hamachi. They were good, but in some cases and some OS that does not support them, I switched to Tailscale.
What was our ROI?
Tailscale is a great solution that is fast, easy, and cheap.
What's my experience with pricing, setup cost, and licensing?
Tailscale is cheap regarding other alternative site-to-site VPN solutions.
Which other solutions did I evaluate?
I evaluated Radmin and ZeroTier, and they were good.
What other advice do I have?
Tailscale is good in performance, but with the previous issues I explained, I can give it just eight until it fixes these issues. I give Tailscale a rating of eight out of ten.
Super Easy Private Network for Secure Server Access
Secure connectivity has supported GDPR-compliant CI deployments across private internal systems
What is our primary use case?
My main use case for Tailscale is connecting to company internal systems due to GDPR requirements. The company is located in Germany with private servers in Germany, and I stay in the UK, so I use it to connect a point-to-site VPN connection from my home laptop to the private servers in Germany. I use Tailscale