Create a secure network between your servers, computers, and cloud instances. Even when separated by firewalls or subnets, Tailscale just works.
A frustratingly complex and brittle collection of firewalls, rules, and holes while wondering if your network is secure enough.
Rolls out in minutes. Devices connect directly, working from any physical location or networking environment. All without poking holes in your firewall.
Devices only connect after signing in through your existing identity provider. Easily enforce multi-factor authentication, deauthorize employees who’ve moved on, and more.
Every device on your network gets a stable IP and auto-assigned domain that stays consistent, no matter what Wi-Fi the device is on. It’s like a local network that works everywhere.
Define role-based access controls to restrict sensitive servers or authorize contractors to only see what they need. And every connection is centrally logged from both ends, viewable from a dashboard and logging API.
Best practices used by billion-dollar companies, made easy for teams of every size.
Hourly and daily rotations minimizes the risk of stolen keys or stale credentials.
Tailscale builds on top of WireGuard’s Noise protocol encryption, a peer-reviewed and trusted standard.
Low latency and private. None of your traffic ever touches our servers.
Logging from both ends of the connection ensures your network traffic is tamper-proof.
Try Tailscale out for free on your own devices.
I just used my private @tailscale tunnels to SSH into my other machines and switch the daemon from tailscale-relay (old) to tailscale (new). I was able to upgrade tailscale remotely without ever losing a link.
THIS is what good software should feel like.
So I decided to reserve this morning to read up on @tailscale and get it set up on my various machines at home.
That took a hot 30 minutes and I have to find something else to do. 🤷
The beauty of @Tailscale is that they enable people to make their own personal internet, for free in most cases. It's this weird paradigm shift, since you have to actively work to make applications insecure rather than the other way around.