My main use case for Tailscale is mesh networking, wherein prior to Tailscale, especially on personal infrastructure, I needed to have a VPN setup that required port forwarding enabled from my ISP side. The main issue with that is that mostly ISPs do not provide static IP addresses as well as port forwarding on personal plans. The most important feature I have seen in Tailscale is its use of NAT traversal to enable internal network access to the outside world in a secure, peer-to-peer manner. Essentially, it replicates the corporate IT VPN infrastructure at a smaller scale, allowing anyone without much technical know-how to install and configure Tailscale. For example, if you want to connect to your home server and route all your traffic through it, that can be achieved simply by using the exit node option in Tailscale, which I find really impressive.
Furthermore, the Magic MagicDNS feature allows me to associate domain names with services running on each individual Docker container in my home lab, enabling access to them as dedicated websites within the Tailnet. If I disconnect from the Tailnet, I cannot access these services, adding another layer of security. I use TSD-Proxy for this, which is an add-on endorsed by Tailscale.
On the corporate side related to my project with Alliance, I have used Tailscale to mimic the corporate IT environment where everything is accessible only within the intranet, not the outside world.
During COVID-19, I collaborated with friends from different locations, one of whom was in the Gulf while I was in India. There was a scenario where I needed a personal VPN connected to a server in the Gulf to perform government-related tasks. My friend was not very technical, primarily being in commerce, but by explaining how to install Tailscale and enabling his laptop to act as a server and an exit node, I was able to get a seamless VPN connection without going through the ISP for a static IP or port forwarding, just one click. This was a very impactful personal use case.
On an enterprise level, I previously mentioned my project with Alliance, where the judges were really impressed with the mesh-to-mesh VPN demonstration that did not require much configuration. They even expressed interest in implementing it at a corporate level. Additionally, as mentioned, with Docker containers, there are various add-ons available. For an efficient setup, I recommend using TSD-Proxy alongside Docker containers, allowing for better management of exit nodes and accessibility settings based on flags set during container creation.
Tailscale has positively impacted my organization by enabling rapid prototyping, especially with junior teams collaborating from various locations. When accessing remote machines over SSH or protocols like RSTP for CCTV cameras, Tailscale allows us to establish a mesh VPN with just a few clicks. Otherwise, configuring a VPN server by ourselves would involve OpenVPN or WireGuard and obtaining permissions from ISPs, a considerable hassle, particularly when some team members are not technical, such as project managers. Tailscale has simplified collaboration significantly at the organizational level.