WireGuard networking for serious operations

Private mesh infrastructure without control-plane chaos.

Nanami gives teams a clear model for tenants, groups, networks, gateways, and policy. The result is less VPN drift and faster day-two operations.

WireGuard transport with centralized control intent
Tenant and group boundaries that match team ownership
Gateway-aware operations for NAT-heavy environments
Hosted and self-hosted modes with one product model

Network control graph

Control intent, regional gateways, and enrolled nodes in one mesh.

ControlGatewayNode
Control planePolicy engineGateway us-eastGateway eu-westGateway ap-southapi-gatewaydb-clusterci-runnerk8s-ingressedge-router
Platform SRE teamsSecurity operationsManaged service providersInternal developer platformsFintech infrastructureHealthcare operationsLogistics networksPlatform SRE teamsSecurity operationsManaged service providersInternal developer platformsFintech infrastructureHealthcare operationsLogistics networks
How it works

Clear layers instead of hidden networking magic

Operations stay understandable as topology and ownership scale.

  • Model tenants, groups, networks, and routing in one control plane.
  • See gateway and node runtime state without SSH-first troubleshooting.
  • Roll out access and routing changes with clear operational boundaries.
  • Keep transport encrypted while policy remains easy to reason about.
Start quickstart
Control flow

Control plane

Desired state and access intent

  • Tenants and groups
  • Policies and join keys
  • Identity and sessions

Gateway fabric

Regional orchestration and path stability

  • Gateway manager
  • Health reporting
  • Runtime metadata

WireGuard data plane

Encrypted packet transport

  • Peer config distribution
  • Gateway selection
  • Node-to-node traffic
Capabilities

Visual-first feature breakdown

Each area below pairs operational context with a schematic diagram.

Policy-first connectivity

Nanami translates tenant and network policy into concrete gateway behavior, so operators can scale access without tunnel sprawl.

  • Express routing intent with ingress and egress controls
  • Keep environments isolated through group ownership
  • Ship policy updates without hand-editing peer files

Policy application path

Intent rolls from tenant policy to concrete gateway behavior.

Tenant policyRule compilerIngress gatewayapidbinternal-ui

Gateway topology that stays understandable

Regional gateways are visible first-class components, not hidden fallback paths, so distributed teams can reason about connectivity quickly.

  • Observe gateway health and path stability by region
  • Support direct and gateway-assisted tunnel behavior
  • Keep NAT traversal behavior explicit in operations

Gateway path stability

Regional gateways preserve connectivity when peer-to-peer links fail.

node-westgateway-westgateway-coregateway-eastnode-eastmobile-node

Identity and security controls

Access decisions stay tied to tenant context, roles, and session state. Security remains part of daily operations, not a separate project.

  • Scoped enrollment for nodes and gateways
  • Role boundaries that reflect real team ownership
  • Session and MFA controls for operator workflows

Identity and access chain

Role scope and session state gate every network action.

OperatorRole bindingTenant scopeNetwork policyNode accessSession + MFA
Screens

Dashboard visuals

Operational views for inventory, policy, and live session behavior.

Network inventory
Network inventory
Live view of networks, gateways, and node health.
Policy workspace
Policy workspace
Edit access and routing intent with explicit ownership boundaries.
Session analytics
Session analytics
Inspect handshake and traffic trends across the mesh.
Pricing

Community, Basic, Pro, and Enterprise

Pick a plan by operating model today, then scale without changing the core product mental model.

Community

Self-hosted

Free control plane stack for labs, internal services, and homelabs.

$0/forever
  • Self-hosted control plane and WebUI
  • Tenant, group, network, and node model
  • Gateway manager and gateway daemon support
  • Community support channels

You run operations, upgrades, and runtime infrastructure.

Read self-hosting guide

Basic

Hosted

Managed Nanami for small teams shipping their first production networks.

$39/month
  • Hosted control plane and WebUI
  • Up to 25 active nodes
  • Email support
  • Core routing and gateway visibility

Best for internal tools and early production rollout.

Start Basic

Pro

Most used

Production

Operational workflows, richer controls, and scale-ready network operations.

$149/month
  • Unlimited nodes and environments
  • Advanced policy and role workflows
  • Priority support queue
  • Extended operational telemetry

Designed for multi-team production environments.

Start Pro

Enterprise

Custom

Custom SLA, compliance workflows, and rollout support for regulated teams.

Custom
  • SLA-backed support and onboarding
  • Compliance and security collaboration
  • Architecture reviews and migration planning
  • Dedicated account partnership

Built for large deployments with strict reliability requirements.

Talk to sales
FeatureCommunitySelf-hostedBasicHosted small teamsProProduction teamsEnterpriseCustom SLA
Control plane hostingSelf-hostedManaged by NanamiManaged by NanamiManaged + dedicated support
WebUI and operator workflowsIncludedIncludedIncludedIncluded
Node scaleInfrastructure-limitedUp to 25 nodesUnlimitedUnlimited
Gateway operations visibilityIncludedIncludedIncludedIncluded
Advanced role and policy workflowsNot includedNot includedIncludedIncluded
Support tierCommunityEmailPriorityDedicated + SLA
FAQ

What teams ask before rollout

Answers focused on migration path, operations, and plan selection.

Does Nanami replace WireGuard?

No. WireGuard remains the encrypted data plane. Nanami adds control-plane workflows for identity, policy, and operations.

Can we self-host from day one?

Yes. Community gives you a self-hosted path with the same tenant/group/network model used in hosted plans.

Who is this built for?

Nanami fits infrastructure teams that run private connectivity across multiple environments, regions, and ownership boundaries.

How does pricing scale as we grow?

You can start with Community or Basic, then move to Pro or Enterprise as production requirements and compliance needs increase.

Ready for a pilot network?

Start with Basic for managed onboarding or Community for self-hosting. Both paths keep the same topology model, so expansion is straightforward.