In this video, we dive deep into Pangolin, a powerful, self-hosted solution that tackles the challenges of exposing services from your homelab or private network. Forget dynamic IPs, CGNAT, and complex port forwarding! Pangolin provides an all-in-one approach to secure remote access, giving you complete control over your network.
**What you'll learn:**
* 🌐 How to bypass dynamic IPs and CGNAT using WireGuard tunnels.
* 🔒 Setting up a secure reverse proxy with Traefik and Let's Encrypt for automatic SSL certificates.
* 🔐 Implementing robust authentication with PIN codes, shared passwords, and user accounts with 2FA.
* 🔗 Generating temporary shareable links for controlled access.
* 🛠️ Step-by-step guide to installing and configuring Pangolin on your server.
* ⚙️ Deep dive into Pangolin's architecture, including Gerbil and Traefik integration.
* 💻 Practical demos showing real-world use cases and configurations.
**Why Pangolin?**
* Self-hosted: Take back control of your network and data.
* Secure: Leverage WireGuard and Traefik for robust security.
* Easy setup: Get your services online quickly with a user-friendly interface.
* Versatile: Expose any service, from web apps to internal tools.
* Free and Open Source.
Whether you're a seasoned homelab enthusiast or just starting out, Pangolin simplifies the process of securely exposing your services. Watch now and unlock the full potential of your home network!
**Timestamps:**
00:00 Introduction
02:07 Pangolin Demo
04:07 Pangolin Authentication
09:04 Pangolin Setup
12:21 Deep dive into Newt
17:23 Traefik configuration
18:42 Gerbil Explanation
**Links:**
* Pangolin GitHub: [https://github.com/fosrl/pangolin](https://github.com/fosrl/pangolin)
* PicturePrism: [https://docs.photoprism.app/getting-started/docker-compose/]
* SearXNG: [https://github.com/searxng/searxng]
#Pangolin #SelfHosting #Homelab #WireGuard #Traefik #ReverseProxy #Security #Docker #Linux #Networking #CGNAT #DynamicIP #OpenSource