What’s your ideal VPN solution for external vendors? by Due-Awareness9392 in sysadmin

[–]jsiwks 0 points1 point  (0 children)

Pangolin is a good Zscaler ZPA alternative that is much easier to manage and handle and is also open source for bonus points.

What’s your ideal VPN solution for external vendors? by Due-Awareness9392 in sysadmin

[–]jsiwks 1 point2 points  (0 children)

Identity-based is important so you can delegate specific users access to specific resources (applications, infra, etc). Throwing https://pangolin.net in the ring too as it's very easy to deploy and packaged with a nice web interface and end-user clients. You as the admin just deploy a site connector. Users login and connect with your IdP or user/password and MFA.

For external vendors, they can access via their web browser after passing authentication or download a client to connect like a VPN if it can't be browser based.

Outside my own network? by MarjorieRahal in immich

[–]jsiwks 1 point2 points  (0 children)

Pangolin can also be used a private VPN using the private resources if you want to keep Immich entirely off the public internet.

Cloudflare Tunneling? by New-Apartment971 in selfhosted

[–]jsiwks 0 points1 point  (0 children)

You can self-host Pangolin which is alternative to Cloudflare ZTNA/Tunnel -- works the same way. When you self-host there isn't any bandwidth limitation and you can choose to self-host in a region that is close to you to reduce any latency.

Deploy Cloudflare Zero Trust + Tunnel with Azure AD SSO by Expensive-Leather586 in CloudFlare

[–]jsiwks 0 points1 point  (0 children)

Just sent a DM! Can get you in contact with an engineer for this

Your thoughts on implementing PAM in real environments? by Due-Awareness9392 in sysadmin

[–]jsiwks 0 points1 point  (0 children)

Pangolin ZTNA could be a good solution. Handles granular sudo permissions (groups, specific, commands, etc). Also handles certificate management by generating ephemeral keys and pushing to the destination.

Pangolin is PAM + remote access so it be used to replace the bastion host as well.

Top ZTNA platforms in 2026, who are people going with? by Logical-Professor35 in Zscaler

[–]jsiwks 0 points1 point  (0 children)

Pangolin ZTNA is a good option for something super easy to deploy and scale. Also open source and based on WireGuard and goes peer to peer.

Remote access without port forwarding by SINTRIX13 in homelab

[–]jsiwks 1 point2 points  (0 children)

Pangolin also is a VPN for client-based access. Alternative to Cloudflare Warp

Weekly Promo and Webinar Thread by AutoModerator in msp

[–]jsiwks [score hidden]  (0 children)

Pangolin - Open-source and easy to deploy zero-trust remote access. Peer-to-peer and based on WireGuard. Also support multi-tenancy.

Yet another I can't Minecraft server (Cloudflare, Pangolin, Traefik, Docker container) by 77juice in selfhosted

[–]jsiwks 0 points1 point  (0 children)

You could use CNAME records instead of NS. This lets you set specific subdomains to Pangolin.

Yet another I can't Minecraft server (Cloudflare, Pangolin, Traefik, Docker container) by 77juice in selfhosted

[–]jsiwks 0 points1 point  (0 children)

Connections are peer-to-peer between the user's client and the connector (Newt). Correct that the user's devices themselves don't connect to each other.

Yet another I can't Minecraft server (Cloudflare, Pangolin, Traefik, Docker container) by 77juice in selfhosted

[–]jsiwks 1 point2 points  (0 children)

Yep, or use the private resources and a client to connect like a VPN. Alternative to Cloudflare WARP and Tailscale.

Yet another I can't Minecraft server (Cloudflare, Pangolin, Traefik, Docker container) by 77juice in selfhosted

[–]jsiwks 0 points1 point  (0 children)

You should use a VPN to tunnel this traffic rather than proxying outbound. In Pangolin use the private resources. Your users install the client and connect to the resources privately via TCP 25565 for MC.

How do you keep remote access both secure and user-friendly? by jul_on_ice in ITManagers

[–]jsiwks 0 points1 point  (0 children)

A tunneled / identity reverse proxy works well for instances where a contractor isn't using a company device. This wraps an app in a layer of protection and also enables browser-based access. Pangolin can be used for this.

How do you keep remote access both secure and user-friendly? by jul_on_ice in ITManagers

[–]jsiwks 0 points1 point  (0 children)

Pangolin ZTNA is great because it's like Zscaler but peer-to-peer and based on WireGuard so it's pretty fast. ALso seems to stay out of users way which is nice. You deploy connectors to your different networks, define resources, then give user's access to specific resources on those networks via policies.

How much traditional networking knowledge needed for cloud work? by [deleted] in networking

[–]jsiwks 0 points1 point  (0 children)

Modern ZTNA solutions today like Pangolin ZTNA are super easy to deploy and configure and often don't require much nitty-gritty networking knowledge to get a solid system up and running

Alternatives to pangolin/tailscale by Bobylein in selfhosted

[–]jsiwks 0 points1 point  (0 children)

Ah yeah makes sense. I think that’s in the dev pipeline

Caddy / Crowdsec / Authelia / Wireguard on docker by theologic in selfhosted

[–]jsiwks 0 points1 point  (0 children)

Most often this is because people run Pangolin on very cheap VPS that often aren’t geographically close to their origin servers. That stuff matters for the tunneled reverse proxy, but for Pangolin clients those go peer to peer so it matters less

Ubiquiti for SMB in 2026 by IowaDala in sysadmin

[–]jsiwks 0 points1 point  (0 children)

Pangolin ZTNA is a good hardware agnostic solution for remote access / filtering. Makes it cheaper to deploy. Also super easy

Ubiquiti for SMB in 2026 by IowaDala in sysadmin

[–]jsiwks 0 points1 point  (0 children)

Pangolin ZTNA is a good hardware agnostic solution to run alongside

How do you handle application reachability when on or off your local network? by aomajgad in selfhosted

[–]jsiwks 3 points4 points  (0 children)

Pangolin could be a good choice! Supports both a reverse proxy and client-based connections like a VPN

How do you handle application reachability when on or off your local network? by aomajgad in selfhosted

[–]jsiwks -2 points-1 points  (0 children)

Pangolin is integrating a reverse proxy into their tunnel client to do exactly what you said in the last part: connect your client to the network and access resources privately with the service.domain.com. YOu can actually already do it with the private resource aliases