Rename to nodes

This commit is contained in:
Owen
2025-08-22 09:48:36 -07:00
parent 9122f1d707
commit 45022e2668
12 changed files with 59 additions and 59 deletions

View File

@@ -3,7 +3,7 @@ title: "Pangolin vs. Reverse Proxy"
description: "Learn how Pangolin's distributed architecture eliminates single points of failure and provides authenticated access to your applications"
---
Pangolin builds upon traditional reverse proxy principles but adds distributed architecture, tunneling, and identity-aware access control. While traditional reverse proxies are typically single-server solutions, Pangolin operates as a distributed network of points of presence that provide highly-available access to your applications.
Pangolin builds upon traditional reverse proxy principles but adds distributed architecture, tunneling, and identity-aware access control. While traditional reverse proxies are typically single-server solutions, Pangolin operates as a distributed network of nodes that provide highly-available access to your applications.
## Traditional Reverse Proxy Limitations
@@ -33,11 +33,11 @@ Pangolin provides high availability at two critical layers: ingress points and b
<Steps>
<Step title="Ingress Routing">
Request is routed to the closest available point of presence. If one goes down, there is always another point available.
Request is routed to the closest available node. If one goes down, there is always another point available.
</Step>
<Step title="Authentication">
User identity is verified at the point of presence before getting routed to your backend.
User identity is verified at the node before getting routed to your backend.
</Step>
<Step title="Tunnel Selection">
@@ -54,7 +54,7 @@ Pangolin provides high availability at two critical layers: ingress points and b
</Steps>
<Info>
This dual-layer approach ensures your applications remain accessible even if individual points of presence or tunnel connections fail.
This dual-layer approach ensures your applications remain accessible even if individual nodes or tunnel connections fail.
</Info>
## Key Differences
@@ -110,5 +110,5 @@ Unlike traditional reverse proxies, Pangolin authenticates every single request,
| **Scalability** | Manual scaling | Automatic regional distribution |
<Card title="Try Pangolin Cloud" icon="rocket" href="https://pangolin.fossorial.io/auth/signup">
Get distributed, authenticated access to your applications with Pangolin's regional network of points of presence.
Get distributed, authenticated access to your applications with Pangolin's regional network of nodes.
</Card>