Post-Quantum Encrypted.
Double-Layered.
Split-Tunnel Routed.
Tunnel connects remote teams to your on-prem AI without exposing a single port to the internet. WireGuard wrapped in post-quantum TLS. The relay sees nothing.
Star Topology. Stateless Relay.
Split Tunnel.
Click a node to inspect it. All traffic flows through a stateless relay that forwards encrypted packets without decryption.
Star, Not Mesh
No peer-to-peer complexity, no N-squared key management.
Split-Tunnel
Only QP traffic routes through the tunnel. Regular internet goes direct.
NAT Traversal
WireGuard punches through NATs and firewalls automatically.
244 Peers
10.7.0.0/24 supports up to 244 unique peers per tunnel.
Expose a Service in One Command
Click Run to watch the entire exposure pipeline execute in real time.
Port pool: 8443-8499 (57 concurrent services)
Nine Commands. Complete Control.
Every tunnel operation maps to a single, auditable CLI command. Click any command to see flags and usage.
Provision relay (local, SSH, DigitalOcean, or generate script)
--provider local|ssh|do|script$ tunnel-setup-relay --provider local --domain relay.example.com
Target joins relay with endpoint and public key
--endpoint <ip:port> --pubkey <key>$ tunnel-join --endpoint 198.51.100.1:51820 --pubkey aB3d...7xYz=
Add remote peer with QR code config generation
--name <peer>$ tunnel-add-peer --name alice
Revoke peer access and archive config
--name <peer>$ tunnel-remove-peer --name alice --archive
Live WireGuard peer status, handshakes, and transfer stats
(no flags required)$ tunnel-status peer-alice: 10.7.0.10 ✓ last handshake 12s ago, tx 4.2MB rx 1.8MB
Relay key rotation with dry-run and backup
--dry-run --backup$ tunnel-rotate-keys --dry-run [DRY RUN] Would generate new relay keypair and re-key 3 peers
Expose local service over tunnel with PQ TLS
--name <svc> --to <host:port>$ tunnel-open --name hub --to localhost:3000
Stop service exposure and archive certificates
--name <svc>$ tunnel-close --name hub ✓ Stopped proxy, archived certs, removed firewall rule
List active services with process status
(no flags required)$ tunnel-list hub :8443 ✓ running pid:4821 cert expires: 2027-03-05
Add a Peer in Seconds
One command generates keys, allocates an IP, creates the config, and produces a QR code.
Security in Every Line
Defense-in-depth practices baked into every script and configuration file.
Night and Day
Remote access with Tunnel versus without.
Without Tunnel
- Ports exposed to internet
Every service is a target for port scanners.
- Single encryption layer
One compromised key exposes all traffic.
- Manual VPN setup
Hours of configuration per peer, per device.
- No audit trail
Who connected when? You'll never know.
- Complex key management
N-squared keys for mesh, manual rotation.
- Relay sees traffic
Traditional VPN gateways decrypt and re-encrypt.
With Tunnel
- Zero exposed ports
All traffic enters through the WireGuard tunnel only.
- Double encryption
WireGuard + PQ-Hybrid TLS 1.3 in parallel.
- One command setup
tunnel-add-peer --name alice. Done.
- Capsule audit trail
Every connection, rotation, and exposure is recorded.
- Automated key rotation
tunnel-rotate-keys with dry-run and backup.
- Relay sees nothing
Stateless forwarder with zero cryptographic keys.
Regulations Demand Encrypted Transport.
Tunnel Delivers It.
Double-layer encryption, per-service isolation, and cryptographic audit trails map directly to what frameworks require.
HIPAA
§164.312(b)Audit controls for ePHI transmission and access logging
Encrypted PHI transmission with double-layer cryptography and per-service firewall isolation
CMMC
Level 2 / CUICUI protection in defense supply chains with encrypted transport
Post-quantum encrypted tunnel with stateless relay ensures CUI never traverses an unprotected link
FedRAMP
AC-17 / SC-8Remote access and transmission confidentiality for federal systems
WireGuard + PQ-Hybrid TLS meets FIPS-aligned cryptographic requirements for federal authorization
SOC 2
CC6.1 / CC6.6Trust services criteria for availability, confidentiality, and network security
Per-service certificates, automated firewall rules, and capsule audit integration for continuous compliance
Built For Teams That Need Zero Exposure
Remote Teams
Connect distributed offices to the AI stack without VPN complexity.
Healthcare
HIPAA-compliant remote access to on-prem patient AI systems.
Defense
CMMC-ready encrypted tunnel for CUI protection.
Developers
tunnel-open, tunnel-close. That's the API.
Security Teams
Double encryption, stateless relay, per-service firewall rules.
MSPs
Multi-provider relay setup for different client deployments.
Connect Your Team.
Zero Exposure.
Post-quantum encrypted tunnels, zero open ports, complete audit trails. Deploy on your hardware in minutes.