---
title: "How Pangolin Works"
description: "Learn about Pangolin's architecture and how its components work together to provide secure application access"
---
Pangolin provides secure, application-specific ingress to your applications through a network of points of presence. Users connect to the closest point of presence, which authenticates them and routes their requests through secure tunnels to your applications.
## How It Works
DNS automatically routes users to the closest available regional point of presence (PoP). A PoP is always available because the control plane fails over between PoPs.
The point of presence verifies the user's identity, checks access permissions, and applies context aware rules such as IP and path based filters, geoblocking, and rate limiting.
Authenticated requests are routed and flow through encrypted WireGuard tunnels to your applications with optional load balancing and failover for your backend servers.
Your applications receive the requests and respond through the same secure path.
Points of presence provide a mesh of high availability - if one location goes down, traffic automatically routes to the next closest location.
## Deployment Options
Large network of points of presence with automatic failover and routing to your backend services.
Host your own multiple points of presence with cloud coordination and automatic failover. Data always transits yours servers.
Fully self-hosted, self-contained Pangolin server acting as a single point of presence.
Detailed information about points of presence and high availability options.
## Key Benefits
Your applications can run on private networks without exposing ports.
Users always connect to the closest available point of presence.
Every request is authenticated and authorized before reaching your applications.
Multiple points of presence, failover, and load balancing between tunnels ensures there is always a way for users to access your applications.