Cette page est affichée en anglais. Une traduction française est en cours.
SkillsMay 5, 2026·3 min de lecture

Firezone — Self-Hosted WireGuard VPN with Zero Trust Access

A self-hosted secure access platform built on WireGuard that provides zero-trust network access with identity-based policies and a web management portal.

Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan selon l'adaptateur et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Needs Confirmation · 64/100Policy : confirmer
Surface agent
Tout agent MCP/CLI
Type
Skill
Installation
Single
Confiance
Confiance : Established
Point d'entrée
Firezone VPN
Commande CLI universelle
npx tokrepo install 2abdf176-481a-11f1-9bc6-00163e2b0d79

Introduction

Firezone is a self-hosted secure access platform that replaces traditional VPNs with a zero-trust network access model. Built on WireGuard, it provides identity-aware access to internal resources with per-resource policies, split tunneling, and a web-based admin portal for managing users and gateways.

What Firezone Does

  • Provides WireGuard-based encrypted tunnels with automatic key management
  • Enforces per-resource access policies based on user identity and device posture
  • Supports split tunneling so only relevant traffic routes through the gateway
  • Offers native clients for Linux, macOS, Windows, iOS, and Android
  • Manages multiple gateways for geographic distribution and high availability

Architecture Overview

Firezone consists of a control plane (Elixir/Phoenix) that handles authentication, policy management, and gateway coordination, plus lightweight gateway nodes that terminate WireGuard connections. Clients connect to the nearest gateway based on DNS-based resource routing. The control plane stores configuration in PostgreSQL and authenticates users via OIDC providers.

Self-Hosting & Configuration

  • Deploy the control plane via Docker Compose with PostgreSQL
  • Install gateway nodes on each network segment you want to expose
  • Integrate with any OIDC provider (Google, Okta, Azure AD, Keycloak)
  • Define resources by DNS name, IP range, or CIDR block
  • Configure access policies per group, user, or device attributes

Key Features

  • Zero-trust model: no implicit network access; every resource requires explicit policy
  • NAT traversal: clients and gateways connect through firewalls without port forwarding
  • Load balancing: multiple gateways per site for redundancy and performance
  • DNS-based routing: resources are accessed by name, not IP address
  • Audit logging: full visibility into who accessed what and when

Comparison with Similar Tools

  • Tailscale — SaaS mesh VPN; Firezone is fully self-hosted with resource-level policies
  • Headscale — self-hosted Tailscale control server; Firezone adds per-resource access control
  • NetBird — peer-to-peer mesh; Firezone uses gateway-routed architecture
  • OpenVPN — legacy protocol with complex config; Firezone uses modern WireGuard
  • Pritunl — OpenVPN-based; Firezone is lighter and uses WireGuard for performance

FAQ

Q: Does Firezone require opening inbound ports? A: Gateways need one UDP port for WireGuard. Clients use NAT traversal and need no open ports.

Q: Can I use Firezone alongside my existing VPN? A: Yes, split tunneling ensures Firezone only handles traffic to defined resources, leaving other traffic unaffected.

Q: What identity providers are supported? A: Any OIDC-compliant provider including Google Workspace, Okta, Azure AD, and self-hosted Keycloak.

Q: Is there a limit on connected clients? A: No artificial client limits in the self-hosted edition. Capacity scales with gateway resources.

Sources

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires