Home/Blog/Comparison

Tailscale and ZeroTier for BAS: Why Mesh VPNs Fall Short

Modern mesh VPNs are built for developers and IT teams. Here is why they do not meet building automation security requirements.

May 3, 2026|9 min read|Comparison

If you have a BAS integrator who is technically savvy, there is a reasonable chance they have tried connecting to building networks using Tailscale or ZeroTier. These mesh VPN platforms are fast to set up, inexpensive, and require no firewall port forwarding. Compared to wrestling with a traditional VPN concentrator, Tailscale or ZeroTier can feel like a revelation.

But building automation remote access is not a networking problem. It is a security and compliance problem. And that is where mesh VPNs — designed for software developers and IT infrastructure — leave gaps that matter.

Why tech-savvy integrators reach for mesh VPNs

The appeal is obvious:

For connecting to development servers, home labs, and IT infrastructure, these tools are excellent. The question is whether they meet the requirements for accessing physical building systems.

What mesh VPNs get right

Credit where it is due. Tailscale and ZeroTier solve real problems:

What they miss for building automation

No protocol awareness

Neither Tailscale nor ZeroTier understands what traffic is flowing through the connection. They cannot distinguish BACnet (UDP 47808) from SSH, SMB, or SQL traffic. Every protocol passes equally. There is no way to restrict a session to only BACnet and Modbus while blocking everything else.

This matters because 70% of OT security incidents involve third-party access, according to Dragos. An integrator who accidentally browses the network or whose machine is compromised has the same unrestricted access as a deliberate attacker.

No session time limits

Tailscale and ZeroTier connections are persistent. Once a device joins the network, it stays connected until someone explicitly removes it. There is no concept of a 4-hour maintenance window that auto-expires.

For BAS remote access, standing access is the primary risk. A technician who connected three months ago to troubleshoot a chiller may still have a live network connection to the building. Mesh VPNs offer no mechanism for automatic session expiry.

No per-protocol traffic monitoring

Neither platform provides visibility into what protocols are being used during a session. Tailscale shows connection status (online/offline) and bytes transferred. ZeroTier provides basic network statistics. Neither reports that "the technician used 14 MB of BACnet traffic and 200 KB of ICMP over a 3-hour session."

Without per-protocol monitoring, there is no way to verify that a maintenance session was limited to its intended purpose. The auditor has to take the integrator's word for it.

No audit trail for compliance

When your auditor, cyber insurer, or risk team asks "who accessed the building automation network, when, using which protocols, and for how long?" — Tailscale and ZeroTier cannot produce that report. They track device connectivity, not session-level access with protocol details.

NIST 800-82, IEC 62443, and most cyber insurance questionnaires require session-level audit trails for remote access to OT systems. A mesh VPN that shows "device was connected from 8am to 5pm" does not meet this requirement.

No device monitoring

Tailscale and ZeroTier are connectivity platforms. They do not monitor the health, uptime, or status of devices on the remote network. There is no alerting when a BACnet controller goes offline, no LTE signal quality monitoring for cellular-connected sites, and no proactive notifications.

No multi-tenant management

An integrator managing 30 client sites needs per-client isolation — no cross-site access, individual technician authentication, client-specific session policies. Tailscale's ACLs can partially achieve this, but it requires manual policy management for each site. ZeroTier's network isolation provides some boundary, but there is no centralized multi-tenant management console designed for the integrator workflow.

ZeroTier's Layer 2: close but not secure enough

ZeroTier deserves special attention because it provides Layer 2 Ethernet emulation. In theory, a ZeroTier Layer 2 network could carry BACnet broadcast traffic, allowing WHO-IS/I-AM discovery to work remotely.

In practice, there are significant limitations for BAS use:

ZeroTier's Layer 2 capability is a building block, not a finished product for OT remote access. It provides the raw connectivity but none of the security controls that building automation environments require.

The compliance gap

When your auditor evaluates your BAS remote access, they will ask questions that Tailscale and ZeroTier cannot answer:

When mesh VPNs work and when they do not

Mesh VPNs are fine for: Internal IT access between your own devices. Connecting your laptop to your home lab. Developer access to staging servers. Situations where all devices are under your control and compliance requirements are minimal.

Mesh VPNs are not sufficient for: Third-party access to building automation systems. Multi-site integrator management. Environments subject to NIST 800-82, IEC 62443, or cyber insurance requirements. Any scenario where you need per-protocol visibility, session limits, and compliance-ready audit trails.

The price difference between a free mesh VPN and a purpose-built BAS remote access platform is real. But the cost of a BAS security incident — Johnson Controls spent $27M cleaning up their ransomware attack — makes that price difference irrelevant.


SiteConduit provides purpose-built remote access for building automation: Layer 2 connectivity, protocol firewalling with default-deny, time-limited sessions, per-protocol traffic monitoring, and compliance-ready audit trails. Built for BAS integrators managing multiple client sites.

Join the waitlist for early access, or visit our FAQ for details.

HB

Hayden Barker

Founder, SiteConduit — Idea Networks Inc.

Hayden has spent over a decade designing and deploying network infrastructure for building automation environments. He built SiteConduit after seeing firsthand how traditional VPNs and remote access tools fail to meet the security and operational needs of BAS integrators and building owners.

BAS Remote Access That Meets Compliance Requirements

Protocol firewalling, time-limited sessions, and audit trails your mesh VPN cannot provide. Join the waitlist.

No spam. We'll only email you about SiteConduit access.