Reviews from AWS customer

8 AWS reviews

External reviews

47 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Adeniyi Stephen

Secure access control has simplified global developer connectivity and protected internal services

  • May 04, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Tailscale is to whitelist connections using the exit node to whitelist certain connections to public addresses. I also use it to access internally exposed load balancers and to gatekeep certain services within the VPN.

For accessing internally exposed load balancers or whitelisting connections, we may have a GKE Kubernetes cluster set up with an authorized network, meaning access is restricted to authorized networks and a VPN Gateway IP that can only access it from the public internet. To give a developer access to the internal IP of the control plane without exposing it publicly, we install a Tailscale operator in the cluster. Once the Tailscale operator is installed, we expose the internal IP of the cluster through one of the pod operators as a subnet router. When developers connect their Tailscale client, they can access the cluster locally without routing through the public internet.

Tailscale can also be used for whitelisting. For instance, if we have a service in the Kubernetes cluster exposed externally through Traefik, NGINX Ingress, or a Gateway and certain users need access, we can set up exit nodes for different regions. If we have users in Europe and users in America, we can set up an exit node for users in America and another for users in Europe. These exit nodes have external IPs that we can use as a whitelist in our externally exposed services. When traffic comes from those external IPs, it is allowed through. When a user connects their Tailscale client and enables one of the exit nodes, they can access the externally exposed address since it is whitelisted to those external IPs. If their Tailscale client is not connected and the exit node is not enabled, they cannot access the externally exposed service.

What is most valuable?

The best features Tailscale offers is that the access control list is good. We can separate different kinds of connections even within the tailnet, allowing developers to connect to certain IPs and services, with engineers having different access levels. Tailscale is fast as well.

The access control lists help my team by allowing us to control who accesses our services. For instance, we have some services on developer clouds where only certain users can connect. Those developer clouds are on our VPC, which is exposed with tailnets. Developers must connect to Tailscale to access the tailnet and developer cloud already exposed to the tailnet. We created groups with certain users and administrators who can access government clouds. We only have to give those groups access to those government cloud IPs, while every other developer cannot access the government cloud IP because the ACL controls this.

For speed, we can use the same ACL. If we only expose certain cluster addresses to certain developers, we open the dev cluster's local address to the developers. In some cases, we want to ensure the security team can access the cluster locally to perform audits. We can grant the security team access to the cluster in the ACL. This works very fast. With just the configuration required in the ACL, within a few seconds, we can see the access reflecting for the security team, and they have access.

In terms of how Tailscale has impacted my organization positively, it is good for security on the network side of things. It helps us connect properly. Because our company is remote globally, even if someone is in Australia and needs to connect to a cluster or any services, instead of routing through the public internet and exposing the traffic there, we can connect internally through Tailscale tailnets, and everybody is working.

What needs improvement?

Tailscale can be improved, especially with logging in. I have two tailnets, for instance, one for personal use and one for my company organization. Sometimes trying to log out of a particular tailnet and connecting to the company's Tailscale tailnet is challenging. Especially if you have been logged into one of those tailnets for a long time and want to log into another one after a few days, the login process can be tricky. Sometimes I have to restart my whole system to ensure that after I log out from one tailnet, I can effectively log into another one. The process is not as smooth as I would imagine, especially if it has been a while. We have to log out and sometimes even switch off the entire system and log back in.

I choose eight out of ten because there are other improvements that can be done with the logging. I am not a fan of the ACL in its current format. It is a JSON ACL, and perhaps if it were in YAML format, that would be better and more readable.

Aside from the logging side of things, everything is straightforward with Tailscale. The ACL can be improved by converting it from JSON format to YAML format for better readability.

For how long have I used the solution?

I have been working in my current field for three years. I have been using Tailscale for close to three or four years.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

We are using Tailscale at the SaaS level, so we do not scale it locally. We do not install it on premises.

How are customer service and support?

Tailscale's customer support is good and very responsive. I would rate the customer support a ten.

Which solution did I use previously and why did I switch?

Before Tailscale, we used a normal VPN like GCP Cloud VPN, for instance, which was adequate but had limitations.

What was our ROI?

I have seen a return on investment in terms of time saved and security. Time saved and security provide good returns.

What's my experience with pricing, setup cost, and licensing?

I am not involved in the pricing side of things as I am an administrator who controls Tailscale and ensures developers have access. The pricing is mostly handled by the IT and accounting team. Based on what I hear from them, it is a bit costly and can be on the expensive side.

Which other solutions did I evaluate?

We went for Tailscale straight away without considering other alternatives.

What other advice do I have?

The advice I would give to others looking into using Tailscale is that it is good for developers. Tailscale is deployed in our organization on public cloud and Kubernetes clusters. We do not have a hybrid or private cloud setup. We have it mostly on public clouds. The UI of Tailscale looks good and is not problematic. I rate this review eight out of ten overall.


    Athalla Barka Fadhil

Secure access has protected critical servers and now simplifies private SSH and service sharing

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Tailscale to publish and as an SSH service. I secure my SSH port and then use Tailscale to SSH into my VPS. I also use Tailscale to serve private services on my VPS so my teammates can access them securely without exposing the port publicly.

Our VPS was attacked by a bot targeting our port 22 or SSH service. Our service is quite critical, so exposing it publicly would pose a danger to our services, especially our company's database. That is why I use Tailscale to secure all of our services.

I use Tailscale to secure our CI/CD pipeline as well. We do not use any SSH key anymore; we use Tailscale SSH instead. I can easily connect to a private VPS using Tailscale without needing to be there because Tailscale acts as a VPN.

What is most valuable?

The best features Tailscale offers that benefit me are the SSH services and VPN services, and how it can expose a service without publicly exposing the port or provide access control to which services are available to our teammates or made publicly available. Tailscale Serve and Tailscale SSH are the most useful features in my opinion.

We are able to share only a specific service with our teammates, which is basically a least privilege access. They will not be able to access the database, but they are able to access our monitoring log and other services.

What needs improvement?

The funnel is particularly handy. It is much similar to Cloudflare Tunnel, but it is from Tailscale. I would appreciate the ability for it to funnel many services from our VPS because as far as I know, it can only funnel one thing from our VPS, so one domain only. If you want more domains, you have to use a sidecar container, which is not quite convenient. If I were to request a feature from Tailscale, it would be to have a funnel that allows me to serve multiple services on our VPS.

Another feature I would request is a custom domain. I would like to customize my Tailscale domain other than funnel. Funnel lets you expose multiple services in your server and then you can customize the domain name for each of the services. Currently, I am only given the MagicDNS domain. If I could give Tailscale access to my DNS management, then Tailscale could customize that domain for our funnel services. I think that would be very helpful.

I am currently facing an issue where on my Mac, Tailscale does not allow me to log in to multiple accounts. It is quite hard to switch between accounts. I think that is quite critical and needs to be improved.

The desktop version on macOS does not allow me to switch between multiple accounts easily. It requires me to log in every time I want to switch accounts, and it actually creates another node for my laptop. Even though I have one laptop, it creates multiple nodes every time I switch accounts from A to B and B to A. When I switch back to my original account, it actually creates another node instead of reconnecting to the previously connected node.

For how long have I used the solution?

I have used Tailscale for about one and a half years.

What do I think about the stability of the solution?

Tailscale is very stable and I have not noticed any downtime so far.

What do I think about the scalability of the solution?

Currently, our organization is quite small, so I have not met any limits from Tailscale.

How are customer service and support?

I have not reached out to customer support because I have been able to solve everything myself and from the documentation, so I have not needed to contact customer service.

Which solution did I use previously and why did I switch?

I used fail2ban to block bots from brute-forcing our SSH service, but because it was not effective enough, I switched over to Tailscale.

How was the initial setup?

Installing Tailscale does save time in managing the firewalls because I do not need to know much about firewalls, especially UFW, as I can just install Tailscale and our server connects instantly. This saves a lot of our time.

Tailscale definitely saves me a lot of time securing our server. I do not really need to install fail2ban or CrowdSec or modify our UFW firewall. I can just install Tailscale, close many ports, and then share them with my teammates. It is really time-saving and, of course, money-saving because Tailscale's free tier is very generous.

What about the implementation team?

I have not reached out to customer support because I have been able to solve everything myself and from the documentation, so I have not needed to contact customer service.

What's my experience with pricing, setup cost, and licensing?

Tailscale is very generous with pricing. I have not met the limit at which I need to upgrade my tier, so I am currently on the free tier and I do not think I need to upgrade because the free tier is more than enough and it is very generous.

Which other solutions did I evaluate?

I went directly to Tailscale.

What other advice do I have?

It becomes much easier to share our services with our teammates without needing to handle the firewall directly. For security, it is indeed much safer now because we can close all of our ports and then just share the link to our machine with our teammates so they can access it using Tailscale VPN.

I would recommend trying Tailscale. Use the managed Tailscale service because its free tier is very generous, and then you can avoid modifying the firewall and completely migrate your entire infrastructure to using Tailscale VPN. I would rate this experience a 9 out of 10.


    Filipovikj Filipovich

Secure access to home servers has transformed how I work with local models and client projects

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Tailscale is the accessibility and simplicity that it offers me to access my servers from anywhere, as well as my local computer and local LLM models. I can access them from anywhere on the network. When I'm doing testing, developing, or handling sensitive data that I don't want to be in the cloud, I can always access my home setup and process the data as required. Additionally, when I was setting up my Kubernetes cluster, I considered Tailscale as a solution for the interconnectivity between the bare metal node and the Oracle virtual machines that I have, which are isolated.

Tailscale helps with accessing my local models and sensitive data due to the simplicity of setting up everything. Even for non-technical people, it's easier to set up. I have my setup with my phone, my laptop, and my servers connected. When I need to work with a client or as a consultant, if they are remote and don't have the technical capabilities to access their infrastructure network, it is as simple as that. I just send them a script showing how to install and what to click to join my Tailscale organization. Then I have access to their system easily.

Tailscale has made things easier for presenting, setting up, and sharing files. When I'm working on a project or building an application in React and want to present the UI, even though it's locally hosted, I can serve it on Tailscale and share the Tailscale link that is accessible from the public so the client can see the work in progress. It has also been useful to use the serve feature for sharing files. If I need to share a specific larger file, I would put it on a share and send the link to a friend or coworker so they can download the file. When the process is finished, I can simply stop the sharing.

What is most valuable?

My opinion about the best features Tailscale offers includes accessibility, simplicity, the file serve feature, and the ability to share internal routes. I can set up access to anything at home. Tailscale will advertise the routes inside the network so you can reach any part of the network without any issues, and it provides the control to isolate everything. I also see they have a new feature called lockout that I want to try.

Tailscale has positively impacted my organization with shorter time for setting up connections and improved accessibility. Even when a non-technical person needs help, I can assist them much faster than explaining the process to them.

What needs improvement?

I don't have any particular ideas or additions about the features. It was nice for the service discovery that I used in the cluster because you can connect and use auto service discovery, but I haven't implemented that much because the complexity of the networking that I have sometimes caused issues.

I haven't thought much about how Tailscale can be improved.

For how long have I used the solution?

I have been using Tailscale for something more than two years.

What do I think about the stability of the solution?

In my experience, Tailscale is stable.

What do I think about the scalability of the solution?

Tailscale's scalability is great.

How are customer service and support?

I find Tailscale's customer support to be good.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

What was our ROI?

I cannot provide input on whether I have seen a return on investment with Tailscale since I used the free version.

What's my experience with pricing, setup cost, and licensing?

I'm using the free version of Tailscale, so I didn't have any experience with the pricing.

Which other solutions did I evaluate?

Before choosing Tailscale, I evaluated other options by looking at Teleport but for a different solution. For networking mainly, I use WireGuard tunnels, which are peer-to-peer connection point-to-point.

What other advice do I have?

My advice to others looking into using Tailscale is to try it. It's simple to set up and simple to connect your applications from anywhere. I would rate this product an 8 out of 10.


    Naji Ashari

Private branches and remote devices have become accessible and stay connected for daily operations

  • April 29, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Tailscale to share the branches in one network to make a site-to-site VPN. I have customers, and each customer has a server with too many branches. We need to access some devices that are not connected directly to the network, such as fingerprints that cannot have any firmware to install, for example, Tailscale agents. I need to connect the branch with the headquarter office and use Tailscale commands to reach the fingerprint through this VPN site-to-site.

This is the main purpose for using Tailscale until now, and I am searching for the other properties and features of Tailscale.

What is most valuable?

Tailscale is fast and easy to install. I can install Tailscale on any operating system, as it has a lot of OS versions and supports Linux, Mac, Android phones, Apple iOS, and Windows. This feature is suitable for my daily jobs and tasks.

Tailscale has a great interface that is friendly and acceptable. Tailscale fixed the problem with reaching devices such as fingerprints, and it is now the most preferred way to connect the site-to-site VPN when we have a customer with fingerprints.

Tailscale is good in troubleshooting, and it takes no time.

What needs improvement?

One of the most significant issues I faced is that in some countries, when I access my Tailscale account, it gives me more steps to verify and confirm, such as sending a message to my mobile and entering the code. I can see this is not helpful for the user experience compared to other alternatives.

Another issue is that when I use Tailscale with other alternatives such as Radmin and ZeroTier, it takes high priority and takes all the incoming connections, even if the other alternative has a different IP scope. It still takes the control and tends to cancel the other software as a VPN site-to-site.

Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.

For how long have I used the solution?

About one year.

What do I think about the stability of the solution?

Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.

What do I think about the scalability of the solution?

Tailscale is good, and I can add any number of branches I need until now.

How are customer service and support?

Tailscale customer support is good. I can contact them and receive a fast response.

Which solution did I use previously and why did I switch?

I still use other tools such as Radmin and ZeroTier. In previous years, I used to use Hamachi. They were good, but in some cases and some OS that does not support them, I switched to Tailscale.

What was our ROI?

Tailscale is a great solution that is fast, easy, and cheap.

What's my experience with pricing, setup cost, and licensing?

Tailscale is cheap regarding other alternative site-to-site VPN solutions.

Which other solutions did I evaluate?

I evaluated Radmin and ZeroTier, and they were good.

What other advice do I have?

Tailscale is good in performance, but with the previous issues I explained, I can give it just eight until it fixes these issues. I give Tailscale a rating of eight out of ten.


    Ismael Junior Coulibaly

Secure remote access has protected data in transit and reduces security incidents across devices

  • April 23, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Tailscale for secure connections in my enterprise by installing an agent on each device, and I use my PCs as an exit node, so all the traffic goes through my laptop and no one else can access the data in transition.

I also use Tailscale at home, so all the data remains encrypted.

What is most valuable?

The best features Tailscale offers are the ease of use and the security it provides for data in transition.

Compared to WireGuard, Tailscale is easier than other tools because the configuration is straightforward, the installation is simple, the setup is uncomplicated, and adding and removing a user is intuitive. Everything is easy with Tailscale, and you don't have to know much about ACLs or similar concepts.

The user interface is very friendly, and the mobile app is very easy to use.

All communication is more secured with Tailscale. As an IT professional with experience in security, I can confirm that there is a level of protection for our data in transition because the data remains encrypted. We can connect to public Wi-Fi without any concern since Tailscale provides encryption for all devices.

I have noticed fewer security incidents since using Tailscale.

What needs improvement?

As long as Tailscale is still updating the tools, everything is working properly currently, so I don't know what they could improve.

In the future, it would be great if Tailscale could add the exit node feature to the mobile app so that you can use exit node mode on your smartphone.

For how long have I used the solution?

I have been using Tailscale for one year now.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

Tailscale is scalable.

How are customer service and support?

I rate the customer support for Tailscale an eight out of ten.

Which solution did I use previously and why did I switch?

Previously, I tried to use WireGuard, but I decided to change to Tailscale because the configuration was quite complex. I chose Tailscale because the installation and configuration were easier.

How was the initial setup?

Pricing, setup costs, and licensing for Tailscale were all affordable, and Tailscale is not that expensive.

What was our ROI?

I have seen a return on investment with Tailscale, and we saved money because we have fewer security incidents. Tailscale has reduced security incidents by thirty percent.

What's my experience with pricing, setup cost, and licensing?

Pricing, setup costs, and licensing for Tailscale were all affordable, and Tailscale is not that expensive.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Tailscale because it relies on WireGuard, which is the more secured VPN.

What other advice do I have?

I rate this product a nine out of ten.


    Dakoh Darko

Secure connectivity has supported GDPR-compliant CI deployments across private internal systems

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Tailscale is connecting to company internal systems due to GDPR requirements. The company is located in Germany with private servers in Germany, and I stay in the UK, so I use it to connect a point-to-site VPN connection from my home laptop to the private servers in Germany. I use Tailscale to create a secure connection.

Apart from connecting to the internal systems, my main use case also provides a very nice interface with the CI pipeline. I connect Tailscale with my CI on GitHub Actions to allow me to do automatic deployments through the company's internal systems.

What is most valuable?

The best features Tailscale offers are really easy usability and a straightforward user experience. It is a one-click install where you select your servers that you want to connect to. The whole integration with GitHub Actions for CI is pretty good, and I use it a lot, so I am very confident in that.

The GitHub Actions integration stands out for me because it is not every day you see a seamless tool that can allow you to perform CI builds on private networks. I and the company have tried other options, and it was difficult, but Tailscale provided their action script, documentation, and simple authentication mechanisms using OIDC on GitHub Actions. Everything was straightforward to set up.

Tailscale has positively impacted my organization by allowing us to speed up development without worrying about GDPR restrictions. One of the things about GDPR restrictions is that we cannot allow data to leave the EU region or Germany. It was very easy for us to integrate GitHub with the whole CI pipeline, and it was a very positive impact. It allowed us to eliminate the stress for our CI and the stress of accessing internal systems from far away. So, it allowed us to focus on the development of the application part rather than struggling with how we are going to get this code deployed on certain servers while still following GDPR restrictions.

What needs improvement?

Tailscale could be improved in different ways. I have not really found any problem with it so far. It pretty much solved the problems of other VPN clients that we have been trying. If Tailscale provided a way to integrate with native cloud providers, such as AWS or other cloud platforms, it could be a very nice thing. For example, I want to connect my EC2 instance from AWS over my private Tailscale network. It could be a nice feature so I do not have to stress about the AWS VPC and all that. I could probably just port it over to my Tailscale network. I do not think they have a feature like that, but that would be fine.

I rate Tailscale an eight because I do not think it has any native cloud support with AWS tools such as EC2, GCP, and Azure. If they can find a way to do that, then it would be fine. One of the things that would actually make more sense is if Tailscale could find a way for us to use serverless compute over private networks. Private server functions or serverless functions probably would not be executed on non-EU regions. That is something I am thinking about.

For how long have I used the solution?

I have been working in my current field professionally for four or five years.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

Tailscale's scalability is good. It is scalable in the sense that we could add as many servers as we want to the network without any downtime from Tailscale. It is pretty fast. Even though I am making a request to the network, the extra hops are pretty much invaluable for network speed. I still get the best speed as possible even though the amount of network hops is two or three. I have to first make a connection to the Tailscale network and then from the Tailscale network to the actual underlying server. Apart from all of that, it is still pretty good. I would say it is really scalable, and I do not think I have ever experienced any downtime with Tailscale.

How are customer service and support?

I have not really had any issues with customer support. I have not really contacted them. If the application is as fine as this, then the customer support should also be good.

Which solution did I use previously and why did I switch?

Before I joined the company, there were several solutions being employed. The company used Teleport and there were a lot of VPN alternatives. There was Twingate and Teleport. We used Teleport before. When I joined the company, we brainstormed together, and I think that was one of the first tasks we did. We found a suitable solution that could handle all this easily, and Tailscale was the one that we picked. We figured out that it was very good.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that pricing was relatively fine. It had a generous free tier, and the pricing was okay. It is good for the amount of servers that we have. Setup cost was not much; it basically was zero setup cost. We probably just did it ourselves. The software was straightforward. We only had to pay for the amount of servers that were going to be able to enter the network. The company handled the licensing, I am not entirely sure about all the details.

Which other solutions did I evaluate?

We evaluated other options before deciding on Tailscale. We tried Twingate, and I do not remember what all the others were that they were using before. There was this NordVPN client that we could use to connect our servers together, but it was not really developer-friendly. There was Zscaler; we tried to use Zscaler, but it did not really get into what we wanted. They were all good options, but it was not what we wanted. We wanted developer-friendly documentation, access to the CI pipeline build, point-to-site VPN connections, and one-click install. I just install Tailscale, connect the servers, and that is all. I do not want to always be starting up the VPN client and finding my servers and trying to make that connection to them. In my system, I am always automatically connected to that network. Tailscale just provided everything that we needed.

What other advice do I have?

My advice to others looking into using Tailscale is to definitely try it out because it is going to really abstract away a lot of network problems, especially when it comes to private networks, private systems, or internal systems in general. It is really going to abstract away a lot of the complexities. I rate this product an eight overall.


    Pablo Nistal

Secure private access across remote teams has simplified network management and collaboration

  • April 08, 2026
  • Review from a verified AWS customer

What is our primary use case?

Tailscale provides us with the opportunity to have a work network. Since we are teleworking, we need to be able to have an internal data center without having to expose it externally to the Internet.

What is most valuable?

Tailscale's simplicity stands out as a key advantage. Our department has several profiles including developers, system architects, and CTOs, which allows us all to work on our own machines. We have a wide variety of people who work with Windows and Linux operating systems, and we can connect to our private network from a terminal. These services are hosted on a data center server and are connected in Docker. Tailscale's wide variety allows us to deploy the services both in Kubernetes clusters and directly on Linux server hosts, as well as in Docker containers, which lets us have a shared resource network without having to create complicated network routing rules. It even allows us to have our own DNS to redirect addresses that we select.

The great ease of being able to interconnect people who might not have a technical profile stands out as an advantage my team gets from using Tailscale for this type of integration and resource management. In the past, we used OpenVPN or Fortinet services, and with just a small installer, it is very easy and simple for employees to use the connection.

The best features that Tailscale offers are ease of use, ease of connection, and a fairly generous connection plan. It allows us to apply ACL policies, which is very beneficial. We do not need to add something extra to define access permissions per user, and that is vital at an organizational level. The console allows you to connect, and there is another interesting feature where you can invite users from other Tailscale networks, which is quite useful.

The ACL is very easy to understand and not as complex as older WireGuard systems. We can create IP ranges or define what kind of people or users can access which resources, which gives us a great deal of peace of mind about our infrastructure.

The most positive impact Tailscale has had on my organization is significant. While working with different providers such as AWS, Azure, or even on-premise, we found that having a single solution to interconnect all those different types of architectures was a complete challenge. Each provider gives its own VPN option, but it is not a scalable, standard, or universal solution. We started using WireGuard to conduct studies of this type, but maintenance became costly, and we always depended on having at least one exposed node to handle the routing or network rules. With Tailscale, the picture changed completely because it allows us, in a simple and native way, to install this type of service, even bypassing complex configurations. We have had situations where we have connection points through CGNAT with 3G routers, and Tailscale provides a solution that is quick, simple, and with very effective speeds, which has pleasantly surprised us.

What needs improvement?

I am currently testing the ability to expose to the WAN certain services that we select, which is in beta. I imagine it is still in development, but from the tests we have done, the connection outward is quite slow, which is a point of curiosity, and I hope that aspect can be improved.

At a basic level, Tailscale could improve the interface to enhance the user experience. Another potential improvement would be to provide Internet exit nodes that are faster. I understand that Tailscale is not a CDN as such, but they could try to achieve some technique that at least provides connections of ten megabytes per second, for example.

Tailscale uses certain flags, such as accepting routes or accepting DNS when logging in, which could be improved. For people who are technical, it is not a problem, but for those who are not as technical, providing this information or presenting it to the user in a simpler way so they understand what they are enabling or disabling could be beneficial.

For how long have I used the solution?

I have been working with Tailscale for about four years personally for my personal platform, and then I have been using it professionally for around two years.

What do I think about the stability of the solution?

I consider Tailscale to be a stable solution. There are other services that I am curious to use because I do not know how they work, but for what we use it for—interconnection and networks—it is very stable.

What do I think about the scalability of the solution?

My experience with Tailscale's scalability is optimal and very good. It is incredible that it can be connected on so many platforms, such as Docker, clouds, and operating systems.

Which solution did I use previously and why did I switch?

Before Tailscale, we used OpenVPN, then WireGuard, and we also used Fortinet. Tailscale encompasses a very good balance for maintaining our own infrastructure.

How was the initial setup?

I have been one of the people who, professionally when I worked at another company, proposed this solution. It seems too novel at first, and it appears that it may not be reliable. Fortunately, at the company I am currently at, they understand the essence of this product or service, which really allows us to save enormous amounts of time in onboarding users, configurations, and removing access quickly and safely. That is the main thing because when we looked at other solutions such as ZeroTier or WireGuard itself, they did not guarantee automatic refresh. With Tailscale, we do see that even the admin panel is very simple, even for non-technical people. It has reduced the complexity of onboarding and implementation by approximately sixty to seventy percent in time, for certain.

What was our ROI?

I have noticed a return on investment from using Tailscale, particularly in time. It has been something around sixty to seventy percent much less time. As for costs, even though I do not handle them, I understand that this reduces costs first because of the time that is spent, and second, in terms of infrastructure requirements, which are minimal. Previously, networks with FortiGate were used, and that forced us to spend on hardware. With Tailscale, that type of investment is not necessary.

Which other solutions did I evaluate?

Before choosing Tailscale, I evaluated other options, and there are many Tailscale forks, but we went directly with this solution because it is the Enterprise version.

What other advice do I have?

Tailscale offers a solution that is already mature, proven and tested, and secure, where you can save costs and maintain a small, medium, or even large infrastructure. I would really appreciate the possibility that Tailnets, instead of giving a random name, would allow us to choose a name and type it. I can rename a Tailnet that it offers directly, but it does not let us write our own, and it would be beneficial if at some point this could be done. I would rate this product and service highly.


    rokawoo.com

Secure network access has simplified real-device testing across mobile and desktop platforms

  • April 03, 2026
  • Review from a verified AWS customer

What is our primary use case?

For Tailscale, we use it in testing in terms of mobile deployment, and it is a great way to connect a mobile device or any device to a network to allow us to get onto our testing networks and see the UI and other things in that regard on different devices very easily.

Tailscale is very intuitive as well as accessible, which allowed us to connect everything to our testing network very seamlessly since it could easily be downloaded onto mobile devices or other devices.

That covers our main use case and what Tailscale does a great job at helping with our testing and device connectivity.

For the platform that we used Tailscale for, we really just set up accounts and were given access through being invited to a Tailscale team, from which we could just set up connectivity on the device.

What is most valuable?

The best features Tailscale offers in my experience would be accessibility from any device; it is on iOS, it is on Android, and it helps us test multiple environments very well, especially for UI testing to ensure all of our UIs are reactive on all devices correctly across our entire infrastructure and device network.

The ease of connectivity in terms of Tailscale's ability to allow downloading the application on any device, whether it be a laptop or mobile, stands out as the most valuable for our workflow, because it allows them to communicate very seamlessly and easily with minimal setup, which was its biggest appeal to our team in developing our platform.

In terms of testing, Tailscale was the best way for us to establish connections across multiple devices and allowed us to test our UI and application across different platforms, iOS, Android, seamlessly, which made our website more reactive and essentially drove our testing.

What needs improvement?

I would not say anything in Tailscale's use case could be improved; what it does and its intended use is perfect, but the application on the laptop is a little buggy since it continuously opens in the background when it should not be.

For how long have I used the solution?

I have been using Tailscale for about two years.

What do I think about the stability of the solution?

Tailscale has been stable in my experience as I have never had problems with connectivity or any bugs in its usage.

What do I think about the scalability of the solution?

I cannot comment too much on scalability since our team always remains very small in developing our platform, but for the team members that we have added to it, there have been no problems, so it has handled everything very well.

How are customer service and support?

I have never needed customer support for Tailscale.

Which solution did I use previously and why did I switch?

We did not use a previous solution; Tailscale was the first thing that came up when we needed to solve our issue of getting onto multiple devices very easily.

How was the initial setup?

I did not handle any pricing, setup costs, or licensing for Tailscale, but from what I know, it was very affordable at only five dollars per month for a team of Tailscale users, which is really easy for small startups.

What about the implementation team?

We went straight for Tailscale without evaluating other options, as it was just perfect for our use case and needs.

What was our ROI?

I have seen time saved as a significant return on investment since it was a big help over dealing with emulators, as Tailscale allowed our application to run directly on our device and see our reactiveness.

What's my experience with pricing, setup cost, and licensing?

I did not handle any pricing, setup costs, or licensing for Tailscale, but from what I know, it was very affordable at only five dollars per month for a team of Tailscale users, which is really easy for small startups.

Which other solutions did I evaluate?

We went straight for Tailscale without evaluating other options, as it was just perfect for our use case and needs.

What other advice do I have?

If you are looking for a one-stop shop application that handles device connectivity across platforms, whether it be PC, Android, or iOS, Tailscale is a great solution for connecting devices together to get onto the same network for easily testing your applications on actual hardware rather than emulated hardware. I give this product a rating of nine out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    reviewer2813076

Secure cluster access has simplified connecting multiple cloud environments from local systems

  • March 31, 2026
  • Review provided by PeerSpot

What is our primary use case?

I have been using Tailscale for approximately one to one and a half years for one of my projects. My main use case for Tailscale during that project was connecting different GCP GKE clusters. I had different production, staging, and testing clusters, and we wanted a way to easily connect to any of the clusters. Tailscale allowed us to easily access any of the clusters we wanted from a local system.

What is most valuable?

I chose Tailscale for this setup because I was searching for different projects to connect different clusters, and I found Tailscale online. There were quite good reviews about Tailscale, which was one of the reasons I chose it to connect different clusters. Tailscale is quite easy to deploy and get started with.

The setup process and documentation for Tailscale stood out to me because the documentation is quite good and the setup is quite easy. You just need to install a single binary on your system and you are ready to go. You can easily connect to any of the systems that you want.

The best features Tailscale offers for me are how easily we can connect to different clusters and different systems. If I have a system somewhere around the globe and I want to connect directly from my local system, it is quite easy. I just need to have Tailscale binary on my system, and I can connect to that specific system.

I did not face any issues with latency or connection reliability while using Tailscale; it was quite seamless for me. Connecting was quite easy.

I discovered some ACL features while exploring Tailscale later on, and I think they are quite good. We can configure some IPs through which we can connect, and I think that is one of the good features Tailscale has.

What needs improvement?

I think Tailscale is quite good for me as I am not a power user. I have mostly used it for basic use cases, and I feel that nothing is missing for me. If there were any power users who have used Tailscale extensively, they might give some feedback on what can be improved upon, but for me, it was good and suitable. I cannot think of anything that needs to be improved upon.

For how long have I used the solution?

I have been working in my current field for more than four years.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

Regarding Tailscale's scalability, we did not use it at a large scale since our team is small, but I think it is good.

How are customer service and support?

Tailscale customer support is good.

Which solution did I use previously and why did I switch?

I did not previously use a different solution because we directly went with Tailscale. We did not have any other solution before that.

How was the initial setup?

My main use case for Tailscale during that project was mostly about connecting different GCP GKE clusters. I had different production, staging, and testing clusters, and we wanted a way through which we could easily connect to any of the clusters. Tailscale allowed us to easily access any of the clusters we wanted from a local system.

What was our ROI?

The time saved by using Tailscale is significant because earlier, when we wanted to connect different clusters, we used to run GCP commands to connect them. With Tailscale, it was quite easy. We were still running the command, but we did not need the specific command anymore because it was just Tailscale binary, and it was quite easy to connect to any of the clusters we wanted. We have seen a return on investment from Tailscale since it was a time-saving tool for us. We did not need different GCP commands to connect to different clusters; it was just a single Tailscale binary through which we were connecting, making it a time-saving solution.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup costs, and licensing for Tailscale is that since our team is quite small, about ten people, we did not take any license and the cost was zero for us because we were using Tailscale's open-source version.

Which other solutions did I evaluate?

Before choosing Tailscale, I thought about evaluating other options, but there was another tool called WireGuard, which Tailscale is based upon. I did not look for any other tool further because I felt that Tailscale was good and would do my job.

What other advice do I have?

I advise others looking into using Tailscale to go for the documentation and just read over the things, as it is quite easy to set up. I think anyone can set up Tailscale. Tailscale is a good tool to use, and it is quite friendly without hassle to set it up. My rating for this review is nine out of ten.


    Kenny Bondly

Secure remote access has simplified client support and reduced connectivity troubleshooting

  • March 27, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Tailscale is access to internal resources and supporting clients, having replaced two different VPN products I was using previously.

I have a number of applications that are running within my network. I have used the split DNS for accessing internal resources or supporting clients.

Using split DNS with Tailscale has helped me manage access and support my clients by being able to use my internal DNS servers easily within the network without needing to have full tunnel connections. It has worked great for exposing particular applications to clients who are shared to particular nodes on my tailnet.

What is most valuable?

The best feature Tailscale offers is the ease of use for managing WireGuard and the fact that the key management is completely transparent, both for the WireGuard tunnel connection and for the SSH functionality.

The transparent key management and SSH functionality have benefited me by completely eliminating a manual, tedious step of needing to manage keys, which felt like a significant security risk that something could go wrong in the key management process. With Tailscale, it just happens and works.

Tailscale has positively impacted my organization and consulting work by making remote connections easy, significantly reducing the friction and making this very reliable, even behind difficult networks with CGNAT or other situations that make establishing connections difficult using other means.

What needs improvement?

I think if there was a streamlined mechanism to self-host the control plane, that would be a significant help in certain regulatory environments where customers feel unsure about having an external party control authentication onto the tailnet. Even with Tailnet Lock, there is still a concern that there are parts of the control plane that are opaque.

For how long have I used the solution?

I have been using Tailscale since September of last year.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

I have not hit the limits of Tailscale's scalability, which works well under automation and infrastructure as code. It is scalable from the perspective I am able to see.

How are customer service and support?

I have not had much of a need to interact with customer support, but the only thing that I have used it for is to establish a custom OIDC identity provider, and the response felt quick and professional.

Which solution did I use previously and why did I switch?

I previously used self-hosted WireGuard and OpenVPN connections because they had difficulty getting through in particular CGNAT connections, and that was the initial impetus for looking at Tailscale.

How was the initial setup?

My experience with pricing, setup cost, and licensing was straightforward and seemed fair for the value that the product provides.

What about the implementation team?

My company does not have a business relationship with this vendor other than being a customer.

What was our ROI?

I do not have any metrics to share. Qualitatively, it definitely feels as though time troubleshooting connectivity has decreased.

Support issues related to connectivity have dropped by about half, and while I do not have an exact measure, the amount of time spent working on connectivity issues has decreased significantly.

What's my experience with pricing, setup cost, and licensing?

I did not purchase Tailscale through the AWS Marketplace.

Which other solutions did I evaluate?

I also evaluated Twingate and ZeroTier before choosing Tailscale.

What other advice do I have?

My advice to others looking into using Tailscale is to give it a try and make sure that it suits your needs, but overall, it feels like a stable product that greatly simplifies VPN and remote connectivity needs. I would rate this product a nine out of ten.