Secure remote access that's 3x faster than OpenVPN with zero-trust, peer-to-peer connections
Docs | Quickstart | Download Clients | Discussions | Support
Firezone is an open source platform to securely manage remote access for any-sized organization. Unlike most VPNs, Firezone takes a granular, least-privileged approach to access management with group-based policies that control access to individual applications, entire subnets, and everything in between.
Get started in under 2 minutes with our managed solution.
Sign up free → (No credit card required)
Once you've signed up, follow the instructions in the welcome email to:
- Install the client on your device
- Connect to your first resource
- Configure access policies
Firezone is:
- Fast: Built on WireGuard® to be 3-4 times faster than OpenVPN with sub-10ms latency overhead.
- Scalable: Deploy two or more gateways for automatic load balancing and failover.
- Private: Peer-to-peer, end-to-end encrypted tunnels prevent packets from routing through our infrastructure.
- Secure: Zero attack surface thanks to Firezone's holepunching tech which establishes tunnels on-the-fly at the time of access.
- Open: Our entire product is open-source, allowing anyone to audit the codebase.
- Flexible: Authenticate users via email, Google Workspace, Okta, Entra ID, or OIDC and sync users and groups automatically.
- Simple: Deploy gateways and configure access in minutes with a snappy admin UI.
Firezone is not:
- A tool for creating bi-directional mesh networks
- A full-featured router or firewall
- An IPSec or OpenVPN server
- Throughput: Up to 5 Gbps per connection
- Latency: Hole-punched connections eliminate routing overhead
- Scaling: Need more capacity? Simply add more gateways
- Memory Usage: Lightweight Rust-based data plane requires only a few MB
- Encryption: WireGuard® protocol with ChaCha20/Poly1305
- Authentication: Multiple SSO providers supported
- Zero Trust: All connections authenticated and authorized
- Audit Logs: Full activity logging for compliance and monitoring
- Compliance: SOC 2 Type I and II compliant (managed offering)
| Feature | Legacy VPN | Firezone |
|---|---|---|
| Setup Time | Hours | 5 minutes |
| Performance | Baseline | 3x faster |
| Architecture | Hub-spoke | Peer-to-peer |
| Zero Trust | ❌ | ✅ |
| Open Source | ❌ | ✅ |
This is a monorepo containing the full Firezone product, marketing website, and product documentation, organized as follows:
- elixir: Admin portal and control plane
- rust/: Data plane and internal Rust libraries:
- rust/gateway: Gateway - Tunnel server based on WireGuard and deployed to your infrastructure.
- rust/relay: Relay - STUN/TURN server to facilitate holepunching.
- rust/headless-client: Cross-platform CLI client.
- rust/gui-client: Cross-platform GUI client.
- swift/: macOS / iOS clients.
- kotlin/: Android / ChromeOS clients.
- website/: Marketing website and product documentation.
- ✅ Full source code available for audit
- ✅ Self-hosting allowed (educational/hobby use)
- ✅ Community support via GitHub Discussions
⚠️ Production self-hosting not officially supported
- ✅ Managed hosting with SLA
- ✅ Production-ready with enterprise support
- ✅ Automatic updates and maintenance
- 💰 Starting free, then per-seat pricing
- View detailed pricing →
Pricing Overview:
- Starter: Free for 6 users with basic features
- Team: $5 / user / month with advanced features
- Enterprise: Custom pricing with directory sync, compliance, priority support
- 🗂️ Directory Sync - Sync users and groups from Google Workspace, Okta, or Entra
- 📝 Audit Logs - Complete activity tracking for up to 90 days for compliance
- 🏢 Priority Support - Dedicated Slack channel for your organization
- 🎯 Custom Integrations - Tailored solutions for your infrastructure
Our license won't stop you from self-hosting the entire Firezone product top to bottom, but our internal APIs are changing rapidly so we can't meaningfully support self-hosting Firezone in production at this time.
If you're feeling especially adventurous and want to self-host Firezone for educational or hobby purposes, follow the instructions to spin up a local development environment in CONTRIBUTING.md.
The latest published clients (on App Stores and on
releases) are only guaranteed
to work with the managed version of Firezone and may not work with a self-hosted
portal built from this repository. This is because Apple and Google can
sometimes delay updates to their app stores, and so the latest published version
may not be compatible with the tip of main from this repository.
Therefore, if you're experimenting with self-hosting Firezone, you will probably want to use clients you build and distribute yourself as well.
See the READMEs in the following directories for more information on building each client:
- macOS / iOS: swift/apple
- Android / ChromeOS: kotlin/android
- Windows / Linux: rust/gui-client
See our detailed License & Pricing section above for comprehensive pricing information.
Additional documentation on general usage, troubleshooting, and configuration can be found at https://www.firezone.dev/kb.
- ⭐ Star this repo to show support and stay updated
- 🐛 Report bugs or request features via GitHub Issues
- 💬 Join GitHub Discussions for community support and conversations
- 🎯 Check out help wanted to get started
- 📖 Read our contribution guide for development setup
- 🏗️ See the development environment setup to start coding
- 🔄 Submit a pull request - all contributions welcome!
Recognition: All contributors get credited in our contributors list.
Community Support (Free)
- GitHub Discussions - Community Q&A
- GitHub Issues - Bug reports and feature requests
Business Support
- Contact Sales for enterprise deployment help
- Support Portal for paid customers
- Priority support included with Team and Enterprise plans
We welcome contributions of all kinds! See CONTRIBUTING.md for:
- Development environment setup
- Code style guidelines
- Testing procedures
- Pull request process
Security is fundamental to Firezone. See SECURITY.md for:
- Security disclosure process
- Vulnerability reporting
- Security best practices
- Audit information
Portions of this software are licensed as follows:
- All content residing under the "elixir/" directory of this repository, if that directory exists, is licensed under the "Elastic License 2.0" license defined in "elixir/LICENSE".
- All third party components incorporated into the Firezone Software are licensed under the original license provided by the owner of the applicable component.
- Content outside of the above mentioned directories or restrictions above is available under the "Apache 2.0 License" license as defined in "LICENSE".
WireGuard® is a registered trademark of Jason A. Donenfeld.