
Overview

Product video
Tailscale is a programmable networking software built on the WireGuard® protocol that ensures seamless connectivity, control, and end-to-end security between any resource on any infrastructure. With Tailscale, you can easily deliver secure remote access, replace legacy VPNs, and power ZTNA and SASE initiatives by simplifying software-defined networking and security operations.
Deploy a zero-config VPN, securely access resources on any infrastructure, unlock site-to-site networking, and modernize Enterprise networking at scale. Tailscale features 100+ technology integrations, works with dozens of leading identity providers, and is available on a wide range of operating system platforms, including Apple iOS & tvOS, Android, Windows, and Linux.
The service handles complex network configurations on your behalf so that you do not have to. Network connections between devices allow for direct connections without the need to manually configure port forwarding. It allows for connection migration so that existing connections stay alive even when switching between different networks (e.g., wired, cellular, Wi-Fi, etc). With MagicDNS, you do not have to deal with IP addresses - you can SSH or FTP into your device, transfer files between devices, or access a web server or database by just using a memorable hostname.
With Tailscale, you gain turnkey transformation by instantly pivoting from a legacy hub and spoke connectivity model to a modern, lightweight, and responsive mesh networking architecture that eliminates single points of failure and delivers better performance, scalability, and security for your end users, devices, and remote resources.
Tailscale brings identity to the network layer, so that you can control access based on user identity, not only IP address. This enables you to intuitively and flexibly define which users should have access to which services based on existing user identities, as well as groups, services, and subnet ranges.
Tailscale is cloud and hardware-agnostic - so you can make decisions about your infrastructure independently from decisions about your network. Tailscale creates an overlay network, using your existing network, which means it can be incrementally deployed. You do not need to buy new network switches or edge devices to use Tailscale, or to change your network architecture.
Tailscale is simple and effortless networking for the cloud era.
For custom pricing, custom EULA, or private contract, please contact aws-marketplace@tailscale.com for a private offer.
Highlights
- Zero-config Business VPN - Rapidly deploy a modernized VPN solution to connect your users, devices, and shared resources.
- Secure Remote Access - Securely access shared developer resources, including VMs, containers, databases, and more- anywhere in the world.
- Site-to-Site Networking - Easily connect your cross-infrastructure and cloud environments to securely transfer data between private resources.
Get personalized pricing in minutes - New
Details
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/month |
|---|---|---|
Per User Premium Plan | For companies who need resource authentication and access controls | $18.00 |
[DEPRECATED] Per User Starter Plan | [DEPRECATED] For teams looking for an easy-to-use, secure, legacy VPN replacement. | $6.00 |
Per User Standard Plan | For teams looking for a secure network access solution that's easy to use and deploy. | $8.00 |
Vendor refund policy
No refunds available.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.


Standard contract
Customer reviews
Secure remote access has simplified my home lab and now routes all my mobile traffic through it
What is our primary use case?
My main use case for Tailscale is connecting me to my home lab, which serves as my front-end infrastructure, whereas I use ZeroTier for back-end infrastructure for connecting things such as IOT devices and personal servers.
A specific example of how I use Tailscale with my home lab is that it allows me to easily provide secure access from myself to my home lab while on the go. This does more than just connect me with my servers; it allows me to run all of my internet traffic on my devices while on the go through my router as the exit node, which allows me to use AdGuard as my DNS server and my home firewall. Overall, it makes me more secure on the go and prevents me from often having to use HTTPS on many of my personal services because Tailscale encrypts traffic already, making HTTPS sort of irrelevant in that specific use case.
What is most valuable?
The best features Tailscale offers are its encrypted tunnel and easy setup VPN, which are common across your space. I personally love two specific things that differentiate Tailscale: the automatic HTTPS setup, which means you don't have to deal with certificates or anything similar, and the ability to use exit nodes very easily, which is a super useful feature.
The automatic HTTPS setup and easy node management have helped me in my daily workflow because I have an automation on my iPhone that runs as soon as I disconnect from my home network, allowing me to tunnel my cellular data through Tailscale back to my home lab and run my router as an exit node. This means I can use AdGuard for my DNS to block anything from malware to ads in general. The HTTPS setup is super useful for another use case I had where I was building an AI German teacher for myself, allowing communication to happen because most browsers require HTTPS for such connections. Not having to set up certificates and simply using the Magic DNS URL with HTTPS on the Tailscale side was super time-saving and useful.
Tailscale positively impacts my organization because I can feel incredibly secure on the go without worrying about opening ports on any routers. It makes an incredible amount of sense for my use, and I wish I could use it more in my role at ADP, though they generally manage that externally through Cisco. But I give my sign-off to advertise to them.
What needs improvement?
The only improvement I see for Tailscale is that I would love to check out Headscale to fully host it on my own infrastructure. However, I think it is a really great product as is. It is easy to set up, and since it uses WireGuard on the back end, it is quite fast. I would love to see a diagram that gives me clearer visibility into how I connect to each node, as I often find I connect to non-direct routes to individual servers, and a visual representation of that would make it easier to visualize.
For how long have I used the solution?
I have been using Tailscale for about five years.
What do I think about the stability of the solution?
Tailscale is stable most of the time, as I occasionally see dropouts. However, I appreciate receiving notifications about drops, which I almost never notice myself. Occasionally, I see on my router that the exit node has gone dark, but I don't notice that in practice.
What do I think about the scalability of the solution?
Tailscale's scalability is very good, with the visibility and ability to access metrics making it easy to scale upward, although I have limited experience with that as I have under 100 devices, around 20.
How are customer service and support?
I have never had to use customer support because the product is that good.
Which solution did I use previously and why did I switch?
I previously used ZeroTier for my back-end services, and I think that is the number one one-to-one competitor within your space. I switched from ZeroTier to Tailscale for two reasons: it was much easier to set up Tailscale, and while ZeroTier still has value, Tailscale makes more sense for the speed, visibility, and overall functionality, especially with exit nodes being easier to use.
How was the initial setup?
Tailscale is incredibly easy to use, and I will always sing its praises. It has made my life a lot easier. I was originally an early adopter of ZeroTier and championed that for a long while. Only in the past couple of years have I switched over to Tailscale, and it has been world-changing, making many things easier to achieve the security I was looking for on the go.
What's my experience with pricing, setup cost, and licensing?
I generally work within a free tier, as there is no reason for me to step outside of that currently.
Tailscale has definitely made it so I don't have to incur additional costs. The ability to use your servers as relay servers instead of setting up my own Headscale server is the primary reason I haven't done so far, because it makes things easy and time-saving.
Which other solutions did I evaluate?
Before choosing Tailscale, I evaluated ZeroTier again. The only reason I haven't moved my entire infrastructure to Tailscale is cost. I can utilize free accounts on both Tailscale and ZeroTier, allowing me to build a back-end infrastructure for my family without paying for an entire organization account. ZeroTier operates on a device-based quota, while Tailscale uses an account-based quota.
What other advice do I have?
A specific example of how I use Tailscale with my home lab is that it allows me to easily provide secure access from myself to my home lab on the go. This does more than just connect me with my servers; it allows me to run all of my internet traffic on my devices on the go through my router as the exit node, which allows me to use AdGuard as my DNS server and my home firewall. Overall, it makes me more secure on the go and prevents me from often having to use HTTPS on many of my personal services because Tailscale encrypts traffic already, making HTTPS sort of irrelevant in that specific use case. I would rate this product a 10 out of 10.
Secure access control has simplified global developer connectivity and protected internal services
What is our primary use case?
My main use case for Tailscale is to whitelist connections using the exit node to whitelist certain connections to public addresses. I also use it to access internally exposed load balancers and to gatekeep certain services within the VPN.
For accessing internally exposed load balancers or whitelisting connections, we may have a GKE Kubernetes cluster set up with an authorized network, meaning access is restricted to authorized networks and a VPN Gateway IP that can only access it from the public internet. To give a developer access to the internal IP of the control plane without exposing it publicly, we install a Tailscale operator in the cluster. Once the Tailscale operator is installed, we expose the internal IP of the cluster through one of the pod operators as a subnet router. When developers connect their Tailscale client, they can access the cluster locally without routing through the public internet.
Tailscale can also be used for whitelisting. For instance, if we have a service in the Kubernetes cluster exposed externally through Traefik, NGINX Ingress, or a Gateway and certain users need access, we can set up exit nodes for different regions. If we have users in Europe and users in America, we can set up an exit node for users in America and another for users in Europe. These exit nodes have external IPs that we can use as a whitelist in our externally exposed services. When traffic comes from those external IPs, it is allowed through. When a user connects their Tailscale client and enables one of the exit nodes, they can access the externally exposed address since it is whitelisted to those external IPs. If their Tailscale client is not connected and the exit node is not enabled, they cannot access the externally exposed service.
What is most valuable?
The best features Tailscale offers is that the access control list is good. We can separate different kinds of connections even within the tailnet, allowing developers to connect to certain IPs and services, with engineers having different access levels. Tailscale is fast as well.
The access control lists help my team by allowing us to control who accesses our services. For instance, we have some services on developer clouds where only certain users can connect. Those developer clouds are on our VPC, which is exposed with tailnets. Developers must connect to Tailscale to access the tailnet and developer cloud already exposed to the tailnet. We created groups with certain users and administrators who can access government clouds. We only have to give those groups access to those government cloud IPs, while every other developer cannot access the government cloud IP because the ACL controls this.
For speed, we can use the same ACL . If we only expose certain cluster addresses to certain developers, we open the dev cluster's local address to the developers. In some cases, we want to ensure the security team can access the cluster locally to perform audits. We can grant the security team access to the cluster in the ACL. This works very fast. With just the configuration required in the ACL, within a few seconds, we can see the access reflecting for the security team, and they have access.
In terms of how Tailscale has impacted my organization positively, it is good for security on the network side of things. It helps us connect properly. Because our company is remote globally, even if someone is in Australia and needs to connect to a cluster or any services, instead of routing through the public internet and exposing the traffic there, we can connect internally through Tailscale tailnets, and everybody is working.
What needs improvement?
Tailscale can be improved, especially with logging in. I have two tailnets, for instance, one for personal use and one for my company organization. Sometimes trying to log out of a particular tailnet and connecting to the company's Tailscale tailnet is challenging. Especially if you have been logged into one of those tailnets for a long time and want to log into another one after a few days, the login process can be tricky. Sometimes I have to restart my whole system to ensure that after I log out from one tailnet, I can effectively log into another one. The process is not as smooth as I would imagine, especially if it has been a while. We have to log out and sometimes even switch off the entire system and log back in.
I choose eight out of ten because there are other improvements that can be done with the logging. I am not a fan of the ACL in its current format. It is a JSON ACL, and perhaps if it were in YAML format, that would be better and more readable.
Aside from the logging side of things, everything is straightforward with Tailscale. The ACL can be improved by converting it from JSON format to YAML format for better readability.
For how long have I used the solution?
I have been working in my current field for three years. I have been using Tailscale for close to three or four years.
What do I think about the stability of the solution?
Tailscale is stable.
What do I think about the scalability of the solution?
We are using Tailscale at the SaaS level, so we do not scale it locally. We do not install it on premises.
How are customer service and support?
Tailscale's customer support is good and very responsive. I would rate the customer support a ten.
Which solution did I use previously and why did I switch?
Before Tailscale, we used a normal VPN like GCP Cloud VPN, for instance, which was adequate but had limitations.
What was our ROI?
I have seen a return on investment in terms of time saved and security. Time saved and security provide good returns.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the pricing side of things as I am an administrator who controls Tailscale and ensures developers have access. The pricing is mostly handled by the IT and accounting team. Based on what I hear from them, it is a bit costly and can be on the expensive side.
Which other solutions did I evaluate?
We went for Tailscale straight away without considering other alternatives.
What other advice do I have?
The advice I would give to others looking into using Tailscale is that it is good for developers. Tailscale is deployed in our organization on public cloud and Kubernetes clusters. We do not have a hybrid or private cloud setup. We have it mostly on public clouds. The UI of Tailscale looks good and is not problematic. I rate this review eight out of ten overall.
Secure access has protected critical servers and now simplifies private SSH and service sharing
What is our primary use case?
I use Tailscale to publish and as an SSH service. I secure my SSH port and then use Tailscale to SSH into my VPS. I also use Tailscale to serve private services on my VPS so my teammates can access them securely without exposing the port publicly.
Our VPS was attacked by a bot targeting our port 22 or SSH service. Our service is quite critical, so exposing it publicly would pose a danger to our services, especially our company's database. That is why I use Tailscale to secure all of our services.
I use Tailscale to secure our CI/CD pipeline as well. We do not use any SSH key anymore; we use Tailscale SSH instead. I can easily connect to a private VPS using Tailscale without needing to be there because Tailscale acts as a VPN.
What is most valuable?
The best features Tailscale offers that benefit me are the SSH services and VPN services, and how it can expose a service without publicly exposing the port or provide access control to which services are available to our teammates or made publicly available. Tailscale Serve and Tailscale SSH are the most useful features in my opinion.
We are able to share only a specific service with our teammates, which is basically a least privilege access. They will not be able to access the database, but they are able to access our monitoring log and other services.
What needs improvement?
The funnel is particularly handy. It is much similar to Cloudflare Tunnel, but it is from Tailscale. I would appreciate the ability for it to funnel many services from our VPS because as far as I know, it can only funnel one thing from our VPS, so one domain only. If you want more domains, you have to use a sidecar container, which is not quite convenient. If I were to request a feature from Tailscale, it would be to have a funnel that allows me to serve multiple services on our VPS.
Another feature I would request is a custom domain. I would like to customize my Tailscale domain other than funnel. Funnel lets you expose multiple services in your server and then you can customize the domain name for each of the services. Currently, I am only given the MagicDNS domain. If I could give Tailscale access to my DNS management, then Tailscale could customize that domain for our funnel services. I think that would be very helpful.
I am currently facing an issue where on my Mac, Tailscale does not allow me to log in to multiple accounts. It is quite hard to switch between accounts. I think that is quite critical and needs to be improved.
The desktop version on macOS does not allow me to switch between multiple accounts easily. It requires me to log in every time I want to switch accounts, and it actually creates another node for my laptop. Even though I have one laptop, it creates multiple nodes every time I switch accounts from A to B and B to A. When I switch back to my original account, it actually creates another node instead of reconnecting to the previously connected node.
For how long have I used the solution?
I have used Tailscale for about one and a half years.
What do I think about the stability of the solution?
Tailscale is very stable and I have not noticed any downtime so far.
What do I think about the scalability of the solution?
Currently, our organization is quite small, so I have not met any limits from Tailscale.
How are customer service and support?
I have not reached out to customer support because I have been able to solve everything myself and from the documentation, so I have not needed to contact customer service.
Which solution did I use previously and why did I switch?
I used fail2ban to block bots from brute-forcing our SSH service, but because it was not effective enough, I switched over to Tailscale.
How was the initial setup?
Installing Tailscale does save time in managing the firewalls because I do not need to know much about firewalls, especially UFW, as I can just install Tailscale and our server connects instantly. This saves a lot of our time.
Tailscale definitely saves me a lot of time securing our server. I do not really need to install fail2ban or CrowdSec or modify our UFW firewall. I can just install Tailscale, close many ports, and then share them with my teammates. It is really time-saving and, of course, money-saving because Tailscale's free tier is very generous.
What about the implementation team?
I have not reached out to customer support because I have been able to solve everything myself and from the documentation, so I have not needed to contact customer service.
What's my experience with pricing, setup cost, and licensing?
Tailscale is very generous with pricing. I have not met the limit at which I need to upgrade my tier, so I am currently on the free tier and I do not think I need to upgrade because the free tier is more than enough and it is very generous.
Which other solutions did I evaluate?
I went directly to Tailscale.
What other advice do I have?
It becomes much easier to share our services with our teammates without needing to handle the firewall directly. For security, it is indeed much safer now because we can close all of our ports and then just share the link to our machine with our teammates so they can access it using Tailscale VPN.
I would recommend trying Tailscale. Use the managed Tailscale service because its free tier is very generous, and then you can avoid modifying the firewall and completely migrate your entire infrastructure to using Tailscale VPN. I would rate this experience a 9 out of 10.
Secure access to home servers has transformed how I work with local models and client projects
What is our primary use case?
My main use case for Tailscale is the accessibility and simplicity that it offers me to access my servers from anywhere, as well as my local computer and local LLM models. I can access them from anywhere on the network. When I'm doing testing, developing, or handling sensitive data that I don't want to be in the cloud, I can always access my home setup and process the data as required. Additionally, when I was setting up my Kubernetes cluster, I considered Tailscale as a solution for the interconnectivity between the bare metal node and the Oracle virtual machines that I have, which are isolated.
Tailscale helps with accessing my local models and sensitive data due to the simplicity of setting up everything. Even for non-technical people, it's easier to set up. I have my setup with my phone, my laptop, and my servers connected. When I need to work with a client or as a consultant, if they are remote and don't have the technical capabilities to access their infrastructure network, it is as simple as that. I just send them a script showing how to install and what to click to join my Tailscale organization. Then I have access to their system easily.
Tailscale has made things easier for presenting, setting up, and sharing files. When I'm working on a project or building an application in React and want to present the UI, even though it's locally hosted, I can serve it on Tailscale and share the Tailscale link that is accessible from the public so the client can see the work in progress. It has also been useful to use the serve feature for sharing files. If I need to share a specific larger file, I would put it on a share and send the link to a friend or coworker so they can download the file. When the process is finished, I can simply stop the sharing.
What is most valuable?
My opinion about the best features Tailscale offers includes accessibility, simplicity, the file serve feature, and the ability to share internal routes. I can set up access to anything at home. Tailscale will advertise the routes inside the network so you can reach any part of the network without any issues, and it provides the control to isolate everything. I also see they have a new feature called lockout that I want to try.
Tailscale has positively impacted my organization with shorter time for setting up connections and improved accessibility. Even when a non-technical person needs help, I can assist them much faster than explaining the process to them.
What needs improvement?
I don't have any particular ideas or additions about the features. It was nice for the service discovery that I used in the cluster because you can connect and use auto service discovery, but I haven't implemented that much because the complexity of the networking that I have sometimes caused issues.
I haven't thought much about how Tailscale can be improved.
For how long have I used the solution?
I have been using Tailscale for something more than two years.
What do I think about the stability of the solution?
In my experience, Tailscale is stable.
What do I think about the scalability of the solution?
Tailscale's scalability is great.
How are customer service and support?
I find Tailscale's customer support to be good.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
What was our ROI?
I cannot provide input on whether I have seen a return on investment with Tailscale since I used the free version.
What's my experience with pricing, setup cost, and licensing?
I'm using the free version of Tailscale, so I didn't have any experience with the pricing.
Which other solutions did I evaluate?
Before choosing Tailscale, I evaluated other options by looking at Teleport but for a different solution. For networking mainly, I use WireGuard tunnels, which are peer-to-peer connection point-to-point.
What other advice do I have?
My advice to others looking into using Tailscale is to try it. It's simple to set up and simple to connect your applications from anywhere. I would rate this product an 8 out of 10.
Private branches and remote devices have become accessible and stay connected for daily operations
What is our primary use case?
I use Tailscale to share the branches in one network to make a site-to-site VPN. I have customers, and each customer has a server with too many branches. We need to access some devices that are not connected directly to the network, such as fingerprints that cannot have any firmware to install, for example, Tailscale agents. I need to connect the branch with the headquarter office and use Tailscale commands to reach the fingerprint through this VPN site-to-site.
This is the main purpose for using Tailscale until now, and I am searching for the other properties and features of Tailscale.
What is most valuable?
Tailscale is fast and easy to install. I can install Tailscale on any operating system, as it has a lot of OS versions and supports Linux, Mac, Android phones, Apple iOS, and Windows. This feature is suitable for my daily jobs and tasks.
Tailscale has a great interface that is friendly and acceptable. Tailscale fixed the problem with reaching devices such as fingerprints, and it is now the most preferred way to connect the site-to-site VPN when we have a customer with fingerprints.
Tailscale is good in troubleshooting, and it takes no time.
What needs improvement?
One of the most significant issues I faced is that in some countries, when I access my Tailscale account, it gives me more steps to verify and confirm, such as sending a message to my mobile and entering the code. I can see this is not helpful for the user experience compared to other alternatives.
Another issue is that when I use Tailscale with other alternatives such as Radmin and ZeroTier , it takes high priority and takes all the incoming connections, even if the other alternative has a different IP scope. It still takes the control and tends to cancel the other software as a VPN site-to-site.
Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.
For how long have I used the solution?
About one year.
What do I think about the stability of the solution?
Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.
What do I think about the scalability of the solution?
Tailscale is good, and I can add any number of branches I need until now.
How are customer service and support?
Tailscale customer support is good. I can contact them and receive a fast response.
Which solution did I use previously and why did I switch?
I still use other tools such as Radmin and ZeroTier . In previous years, I used to use Hamachi. They were good, but in some cases and some OS that does not support them, I switched to Tailscale.
What was our ROI?
Tailscale is a great solution that is fast, easy, and cheap.
What's my experience with pricing, setup cost, and licensing?
Tailscale is cheap regarding other alternative site-to-site VPN solutions.
Which other solutions did I evaluate?
I evaluated Radmin and ZeroTier, and they were good.
What other advice do I have?
Tailscale is good in performance, but with the previous issues I explained, I can give it just eight until it fixes these issues. I give Tailscale a rating of eight out of ten.