What is our primary use case?
My main use case for Tailscale is accessing my home network when I'm outside. Essentially, it functions as a VPN.
I use Tailscale to access my home network by connecting to a main machine that runs Tailscale, which is separate from my home server. This allows me to connect to it even when my home server goes down, and it serves as a subnet router so I can access my home network through that single machine instead of connecting every single virtual machine to the same Tailscale network.
What is most valuable?
In my opinion, the best features Tailscale offers are its ease of use and quick setup. You essentially just need to run a command and you're connected to Tailscale network, and I love MagicDNS as well. Ease of use, MagicDNS, and the subnet router capabilities are very good.
I appreciate that MagicDNS helps me avoid memorizing IP addresses, and the subnet router allows me to use one device to connect to the entire network. For example, if I have a smart TV that cannot install Tailscale, I can access it through my subnet router machine. I set it up this way because I only have Tailscale installed on that entry point machine, which serves as the gateway to my network.
Tailscale has made managing and accessing my home network easier compared to using OpenVPN before. Previously, I had to manage everything myself, run the server, and keep it operational. If the server ever went down, I couldn't access my home network. With Tailscale, the situation is similar, but I don't have to expose any ports; I just connect a device to Tailscale servers. The main difference is that I don't have to run the VPN server since Tailscale does it for me, connecting my devices through their service. It's really great that I don't have to worry about all the setups.
I appreciate how their login system works. Tailscale services are fast, and since processing is done on the clients rather than the servers, they can focus on providing a good, reliable service. I don't think I've ever faced downtimes or connection issues from another country.
What needs improvement?
Tailscale does a great job for free-tier users, and the 100 device limit is very fair. However, I think improvements could be made in the support for UI clients, especially on Linux machines. In Windows and macOS, the UI support is good, but Linux is more customizable and has a unique setup, and I feel like I never have a good UI to interact with when using Linux desktops, which is unfortunate.
For how long have I used the solution?
I've been working in my current field for about four years.
What do I think about the stability of the solution?
Tailscale is stable for me.
What do I think about the scalability of the solution?
I feel Tailscale would handle adding more devices or users in the future easily, and I am confident of it. As a free-tier user, I have tested my limits, connecting the maximum amount of devices, and everything performed great. After that, I switched to subnet routing, allowing one device to forward traffic into my home network, which also circumvented device limits.
How are customer service and support?
I never interacted with Tailscale's customer support because I never needed to. Tailscale is that reliable, and their documentation answers any questions I have.
Which solution did I use previously and why did I switch?
I previously used OpenVPN before switching to Tailscale. I liked OpenVPN, but setting it up in a production environment was more of a learning experience rather than a complete permanent solution. You always find yourself wondering what improvements could be made. While OpenVPN is fine for production use, I'd say a managed service is more professional because it provides guarantees and reduces concerns. I switched to Tailscale out of curiosity, wanting to try WireGuard, and I was sold after just one to two minutes of setup.
Before choosing Tailscale, I evaluated other options, including OpenVPN. I was familiar with running my own VPN solution and considered using WireGuard directly on my home network or opting for Tailscale, which uses WireGuard in the background. I wanted something that worked correctly the first time, so I chose Tailscale while planning to tinker with WireGuard later.
How was the initial setup?
My advice for others looking into using Tailscale is simple: just do it. Spin up a virtual machine, run the one-line command that Tailscale provides, and see how it works because it's so intuitive that nobody can mess it up.
What was our ROI?
I've seen a return on investment with Tailscale in terms of time saved and less maintenance required. I learned a lot from installing and maintaining OpenVPN, which sometimes required extensive hands-on configuration and problem-solving. With Tailscale, I set it up and forget it because it just works, allowing me to avoid worrying about the whole VPN aspect of my home network architecture. Every return on investment with Tailscale is time saved and reliability from the managed service.
What's my experience with pricing, setup cost, and licensing?
I wouldn't say I have an experience with pricing, setup costs, or licensing because I use the free tier. My needs have never exceeded the free tier as I am the single maintainer of my home network and server, which is beneficial.
What other advice do I have?
I think Tailscale is an awesome product; I use it every day and have it implemented in my home network. As long as the free tier stays the same, I don't see myself switching from it.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.