Personal Remote Access Guide
While Cloudflare Zero Trust is used for official corporate resources, you may need a simpler way to access your personal work PC via SSH from home or while traveling. This guide covers Twingate and Tailscale for personal developer use.
Tailscale (Mesh VPN)
Tailscale is based on WireGuard and creates a secure mesh network between your devices. It is extremely easy to set up and works through most NATs and firewalls.
Setup on Host (Work PC)
- Sign up at tailscale.com.
- Install Tailscale:
- Linux:
curl -fsSL https://tailscale.com/install.sh | sh - macOS/Windows: Download from the official site.
- Linux:
- Login: Run
sudo tailscale up(Linux) or use the GUI. - Get your IP: Run
tailscale ip -4or check the Tailscale Dashboard.
Setup on Client (Home PC/Laptop)
- Install Tailscale and login with the same account.
- Connect: Simply SSH using the Tailscale IP found in step 1.1.
ssh user@100.x.y.z
Twingate (Zero Trust Access)
Twingate is a Zero Trust solution that doesn't require a virtual network interface on the host, making it very "invisible" to the system.
Setup
- Create a free account at twingate.com.
- Add a Remote Network: Create a "Home" or "Office" network in the dashboard.
- Deploy a Connector:
- Install the Twingate Connector on your Work PC (Docker is the easiest way).
- Copy the provisioning tokens from the dashboard.
- Add a Resource:
- Add your Work PC's local IP (e.g.,
192.168.1.50) or hostname as a resource. - Enable the SSH protocol for this resource.
- Add your Work PC's local IP (e.g.,
Client Access
- Install the Twingate Client on your laptop/home PC.
- Authenticate with your Twingate account.
- Once connected, you can SSH to your work PC using its Local IP as if you were in the same room.
Which one should I choose?
| Feature | Tailscale | Twingate |
|---|---|---|
| Model | Mesh VPN (Virtual Interface) | Zero Trust (Identity-based) |
| Visibility | Devices see each other's 100.x.y.z IPs | Devices use original local IPs |
| Ease of Use | Very High (Install & Go) | High (Requires Connector setup) |
| Best For | Direct device-to-device SSH | Granular access to local network resources |
Security Note
Always use SSH keys for authentication. Even with Zero Trust/VPN layers, password-based SSH is a security risk.