Capabilities

All key operator capabilities are organized as one operating workflow.

Nanami brings day-one onboarding, day-two operations, and combined transport plus access control into one operator workflow.

One shell
Product model

Marketing, docs, and app now move through the same product language.

Guided
Onboarding

First-run flows lead into network creation, enrollment, and policy instead of dead empty screens.

Operator-first
Workflow

Control, routing, and observability stay inside one operating path.

Policy application path

Intent rolls from workspace policy to concrete gateway behavior.

Workspace policyRule compilerIngress gatewayapidbinternal-ui
Feature stack
Operators see policy, transport, and identity as one system.

Capabilities are explained through working models rather than disconnected promises.

Core capabilities

Capabilities are grouped around real operator jobs.

Nanami is organized around clear layers: operational clarity, data-plane resilience, security by default, and team workflows.

Operational clarity

Organize infrastructure with teams, environments, and reusable network policy patterns.

Declarative network modeling
Consistent naming and lifecycle states
Access scopes aligned to team ownership

Data-plane resilience

Build resilient paths using gateway nodes and region-aware topology controls.

Gateway failover primitives
Node and tunnel health reporting
Topology that fits hybrid infra

Security by default

Enforce secure enrollment and reduce blast radius with layered permissions.

Short-lived join tokens
Least-privilege role assignments
Audit-ready change history

Team workflows

Enable platform, SRE, and security teams to collaborate with less friction.

Shared dashboard views
Human-readable troubleshooting data
Predictable onboarding process

Deployment flexibility

Run Community or SaaS Enterprise with a unified product model and UX.

Community stack reference
SaaS mode for managed operations
Gradual migration path

Operational confidence

Move from reactive fixes to proactive operations with integrated visibility.

Status views for nodes and gateways
Session-level diagnostics
Clear admin and user boundaries
Interaction evidence

The feature set is anchored to concrete operator patterns.

The feature set resolves into inspectable workflows: policy application, gateway path stability, and identity-aware access review.

Policy application path

Intent rolls from workspace policy to concrete gateway behavior.

Workspace policyRule compilerIngress gatewayapidbinternal-ui

Gateway path stability

Regional gateways preserve connectivity when peer-to-peer links fail.

node-westgateway-westgateway-coregateway-eastnode-eastmobile-node

Identity and access chain

Role scope and session state gate every network action.

OperatorRole bindingWorkspace scopeNetwork policyNode accessSession + MFA
Decision path

Each capability points to the next useful step.

Teams can move from feature evaluation into docs, architecture, security review, or a live environment without losing context.

Quickstart

Inspect the first production-shaped flow from network creation into node enrollment.

Architecture

Review the ownership, topology, and routing model before the first rollout.

Security review

Check how identity, gateways, and route intent become one inspectable security surface.

Next step

Need a platform that does not split into disconnected subsystems?

Move into rollout planning, open the docs, or launch Nanami with the same product language you see here.

Need the Community path?

Community docs keep the same product model and a truthful operator path.

Need rollout guidance?

Pricing and direct contact help teams choose the right Community, SaaS Enterprise, or planning path.