Great multidevice network connectivity
What do you like best about the product?
I love the way it can connect my all the devices in a single network without adding the need of the same network connection.
What do you dislike about the product?
I only don't like the pricing it offers, and it doesn't offer mobile device to desktop connectivity I need to use external software with it to do so.
What problems is the product solving and how is that benefiting you?
I am currently using it to mange my office desktop and my home device simultaneously from a single laptop and also sometimes I access it through my mobile device using another software.
Familiar, Flexible UI That’s Easy to Use
What do you like best about the product?
It’s easy for me to use, and the software feels very familiar. The dashboard and overall UI are easy to understand, and they’re flexible as well.
What do you dislike about the product?
Almost everything is fine, but there’s one thing I really dislike. The free plan is okay, but the Teams plan is very expensive, and as the number of users grows over time, the cost will increase as well. Aside from that, everything is fine.
What problems is the product solving and how is that benefiting you?
With Tailscale, we can now safely access servers, internal tools, and systems from anywhere. It also feels very secure and easy to lock down. For our team, it has reduced IT management effort and saved us time.
Reliable Remote access Solution, Easy to Use
What do you like best about the product?
It's easy to use for me. And Very familiar Software. Dashboard and all Ui are easy to Understand.
What do you dislike about the product?
Almost everything is FIne but one thing I hate is about for free plan is fine but teams plan is very high chargable and as time number of users is grow, cost will also increase. so apart from that, everything is fine.
What problems is the product solving and how is that benefiting you?
Through tailscale, now we can safely access servers, internal tools, and systems from anywhere. It's also very securable. and also For our team, it reduced IT management efforts and saved time.
Tailscale Makes Secure Connections to Computers and Cloud Servers Effortless
What do you like best about the product?
Tailscale enables directly connect computer, any cloud-based server, virtual machines and more just with simple click and easy to manage in one place with having different network.
What do you dislike about the product?
Only one thing is I can't access properly my laptop or any machine from my phone, this feature should be added in future.
What problems is the product solving and how is that benefiting you?
It really help me to connect many devices, which are on different networks that easily manage by this product. Save a lot time for setup and initialization.
Simplifies Global Device Connectivity with Ease
What do you like best about the product?
I really like Tailscale's ability to connect devices peer-to-peer using the WireGuard protocol, regardless of the network situation or device status. It's great that the device doesn't need a public IP for others to connect to it. I use Tailscale with PFSENSE and a few other servers, especially AWS, and it works great in terms of security and ease of use. Its ability to support multi-platforms like Apple TV is a really great feature. The initial setup of Tailscale is very straightforward, and the manual and documentation contain everything that's needed. If I find anything confusing, I can easily refer to YouTube videos to walk me through the setup.
What do you dislike about the product?
I think the thing that Tailscale doesn't work well is the authentication. A lot of times, almost always, you would have to sign in your Google account to authenticate a device. And sometimes if you have not used Tailscale for a long time, it'll prompt you for re-signing in your Google account to log in to your Tailscale account. In some cases where the device is sitting behind a network with strict regulations preventing Google access, like in China, you wouldn't be able to authenticate yourself and thus can't use Tailscale effectively.
What problems is the product solving and how is that benefiting you?
I use Tailscale to connect my network stations globally, solving NAT traversal issues and enabling peer-to-peer device connectivity without needing a public IP.
Securing private cloud workflows has protected sensitive AWS resources with fine-grained access
What is our primary use case?
We have been using Tailscale for about four or five months, and we have been using it from the beginning.
For our main use case, we use Tailscale because it creates a peer-to-peer VPN mesh where we host our AWS infrastructure behind it, so the general web cannot directly access it. It is only accessible from authorized systems, such as the one that I have.
A specific example of how we use Tailscale for this peer-to-peer VPN mesh in my daily work is that the entirety of our AWS infrastructure and systems that we use to build at Flyra are behind a private VPN that is accessible using Tailscale. The general web cannot access it, so we ensure that there is nothing unauthorized accessing our servers. Authorized and recognized systems are only able to access the infrastructure and the resources that we want restricted, and that is where Tailscale comes in.
About my main use case, I am fully aware that it is end-to-end encrypted. We maintain access using ACLs, which allows us to fine-tune the fine-grained rules for who can connect and to what.
What is most valuable?
The best features Tailscale offers are highlighted by the fact that setting up Tailscale was straightforward, at least once you are following the documentation and the guides. The security is valuable, as there are many providers available, but Tailscale fulfills the requirements that we had, allowing us to access and expose internal apps without exposing them to the general internet. The complex site-to-site connections are replaced using VPNs, and we can SSH into our remote desktops or SSH into our EC2 machines in our AWS regions in a secure way.
About the features that make Tailscale stand out for me, with access control lists, we can fine-grain what can be accessed and by whom. It solved our base use case, which is keeping our secured infrastructure behind a private VPN, and that is why we started using it in the first place.
Tailscale has had more positive impacts on my organization regarding security.
What needs improvement?
Regarding how Tailscale can be improved, I think for free users, there are some limited options. However, we have a paid policy, so we pay Tailscale every month. At some point, we may want to host our own coordination servers, which Tailscale does not have right now. However, it is just a general consideration, and I doubt that we will have that problem soon.
Regarding the needed improvements for paid users, I think things are acceptable. The limits could be higher for free users, and that is all.
For how long have I used the solution?
I have been a software developer for about two years, and that represents full-time experience.
What other advice do I have?
My advice to others looking into using Tailscale is that if there is a use case where you want to secure your private EC2 instances, the workflows, your Git repositories, and sensitive data, Docker images, Maven builds, Gradle builds, and so forth, behind and away from the general internet and onto your private cloud, Tailscale can act as that link, allowing you access to that private information from authorized systems while also fine-graining that control. I would rate this product a nine out of ten.
Streamlined Local VPN Setup, Needs Better Connectivity
What do you like best about the product?
I really like how Tailscale is simple to use. It’s straightforward with a Mac desktop, where you just plug in your credentials and the client's credentials, and you’re good to go. The software has simple installations and clear guides. The setup was really easy with the documentation provided, and everything went smoothly.
What do you dislike about the product?
Sometimes it might be a blocker, I would say. You might be blocked out every now and then. For example, maybe they have some caches, so they keep your credentials locally for around forty-eight hours or seventy-two hours, so you might be logged out. Network isolation or something needs to be taken care of. That could be improved for better connectivity.
What problems is the product solving and how is that benefiting you?
Tailscale allows me to work locally without the need for commercial VPNs, solving connectivity issues by enabling local setup.
Effortless Remote Access for Home Networks
What do you like best about the product?
Being able to install it on my Mac mini (home server of sorts) and use the subnets to be able to access my routers, and generally act like Im at my house, while away. Also this works for my NAS, I can not remove any exposure to it from the internet, and allow only LAN access, which allows me to access it remotely with TS.
What do you dislike about the product?
Tailscale is good for small “home scale” networks. I find it very cumbersome for large scale networks (eg at production scale networks) where you have to want to do more advanced stuff like DNS routing, granular ACLs, etc. Some of it is technically possible with Tailscale but it is very cumbersome and doesn’t scale well. For personal use, I think netbird and zerotier to be functionally similar and different pros/cons.
What problems is the product solving and how is that benefiting you?
I am not any sort of network guru. I just wanted to be able to access my home Linux box remotely with a laptop or tablet. Getting this set up using ddns and port forwarding through the cable box was getting to be a pain. Maybe I'm just not smart enough. I read about tailscale and a couple of YouTube videos I decided to give it a try. Couldn't have been easier. Now it's two desktops, two Amazon fire tablets, and a Linode instance later...
Experience using TailScale
What do you like best about the product?
probably that is not that complicated to use, once you get the context its pretty straight forward
What do you dislike about the product?
probably the process of disconnecting, its always turned on and sometimes you do not need the VPN as youll probably be doing other tasks that do not require VPN
What problems is the product solving and how is that benefiting you?
probably the access to the company's systems, with a secure network to make sure that we comply with the security standards
Easier to use and easier to set up
What do you like best about the product?
It's fast, straightforward, and lightweight. Easy to implement as well.
What do you dislike about the product?
Nothing comes to mind. It's very smooth so far in my team.
What problems is the product solving and how is that benefiting you?
Replacing our previous implementation which is OpenVPN