6-Part Tutorial Series
WireGuard Mesh & Tunnel Architectures Mastery
A deep, deployable guide to self-hosted overlay networking and reverse tunneling on RamNode. Five tools across three categories — managed mesh VPNs, decentralized overlay with PKI, and reverse-tunnel ingress.
Netbird, Netmaker, Nebula, Pangolin, Chisel
~6 hours total
6 parts
Three Categories, Five Tools
Mesh VPNs (central control plane)
- • Netbird — polished, OIDC-first
- • Netmaker — kernel WireGuard, MQTT
- • Best for SSO-driven team access
Decentralized Overlay with PKI
- • Nebula — Noise protocol, offline CA
- • Lighthouses for discovery only
- • Control plane never in data path
Reverse-Tunnel Ingress
- • Pangolin — self-hosted Cloudflare Tunnel alternative
- • Chisel — single-binary HTTP/WS tunnel
- • Expose private services without a public IP
Honest framing: Netbird, Netmaker, and Pangolin use WireGuard as their data plane. Nebula uses the Noise protocol with its own certificate authority. Chisel tunnels TCP/UDP over HTTP. They sit in this series because anyone evaluating one almost always evaluates the others.
Prerequisites
- • Comfort with Ubuntu 24.04 LTS, systemd, and basic Linux networking
- • Docker 27+ and Docker Compose v2 familiarity
- • A domain you control with DNS pointed at your RamNode VPS
- • Working knowledge of TLS, reverse proxies, and (helpful) OIDC
- • Tolerance for terminal output and config files — this series is hands-on
Suggested Bill of Materials
The whole series fits comfortably on two RamNode VPS instances if you reuse the same host across parts (one 4 GB control-plane host, one 2 GB lighthouse / chisel host). Production deployments typically scale up the control-plane host to 4–8 GB depending on fleet size.
