6-Part Tutorial Series

    Pangolin on Your VPS

    From architecture overview to production-hardened zero-trust access — self-hosted tunneled reverse proxy with WireGuard, identity-aware access control, and no open ports on your private network.

    Zero-trust access
    ~3 hours total
    1 KVM VPS required
    Start Part 1

    What You'll Build

    Infrastructure & Tunneling

    • • Pangolin + Gerbil + Traefik on a RamNode KVM VPS
    • • WireGuard tunnels via Newt — no open ports on private networks
    • • Multi-site management across home labs and remote servers

    Access & Production

    • • HTTPS resources for Nextcloud, Jellyfin, Gitea, and more
    • • Private access to SSH, databases, RDP, and full subnets
    • • SSO, CrowdSec, automated backups, and update workflow

    Series Roadmap

    Prerequisites

    • • A RamNode KVM VPS — 1 GB ($6/mo) for personal use, 2 GB+ for teams (WireGuard requires KVM)
    • • A domain name with DNS control (wildcard A record support)
    • • Ubuntu 22.04 or 24.04 LTS
    • • SSH access to the VPS
    • • Basic Linux command line knowledge

    Looking for a Quick-Start Guide?

    If you want a condensed, single-page walkthrough to get Pangolin running quickly, check out our standalone deployment guide.

    Pangolin Quick-Start Guide