When to Use NFLTR

Use this page to choose the right starting path: hosted orchestration on nfltr.xyz, a self-hosted NFLTR control plane, or a transport-first operator path.


Choose your default path

PathChoose it whenNext step
Hosted orchestrationYou want the hosted control plane, dashboard visibility, guided docs, and planner-worker workflows on nfltr.xyz.Agent Orchestration
Self-hosted control planeYou need your own deployment boundary, operator-controlled infrastructure, or standalone rollout path before you onboard planners and workers.Standalone VM deployment guide
Transport-first operator pathYou mainly need stable identities, verified routes, browser terminals, or secure sharing before the broader orchestration story.CLI Reference and Dashboard

Not all connectivity problems look the same

Some teams start with hosted orchestration and dashboard visibility. Others need a self-hosted boundary first. Others still begin with transport, remote access, or operator workflows. NFLTR covers all three, but you should choose the path deliberately instead of treating every mode as the same onboarding story.

The short version

Choose NFLTR when you want stable identities, verified routes, operator workflows, and one platform that can support hosted orchestration, self-hosted operation, and transport-first access without changing products.


Where NFLTR is strongest

NeedWhy NFLTR is strong
Self-hosted control planeSingle-binary self-hosting for simple deployments, plus Redis/Postgres-backed multi-pod operation for larger environments.
More than HTTP tunnelsHTTP, gRPC, raw TCP, WireGuard, agent-to-agent messaging, P2P, browser terminal, and embedded SSH all live in one platform.
Stable identitiesAgent IDs are first-class identities, not disposable random URLs.
Verified-route securityNFLTR supports agent-terminated TLS, WireGuard, and E2EE A2A paths where the NFLTR relay forwards opaque encrypted data.
Verifiable trustTLS fingerprints, combined identities, and the append-only transparency log give users a way to verify relay claims.

Where NFLTR still asks more from you

NFLTR is not a zero-decision product. It assumes you care about route naming, identities, policies, and trust boundaries.

That is a deliberate trade: more control, more explicit trust boundaries, and less magic.


Choose NFLTR when...


NFLTR is probably not the right fit when...


What NFLTR is improving right now

The biggest product gaps are no longer missing transport primitives. They are packaging and operator UX.

FocusWhy it matters
Route catalog + domain onboardingShow every stable, public, and E2EE entry point for an agent in one place, with configuration hints.
Public E2EE proof UXTurn fingerprints and transparency data into a shareable trust story for end users.
Explicit tunnel modesMake the difference between verified, inspectable, and private-share tunnels obvious.
Recent dashboard change

The dashboard now includes a per-agent route catalog showing stable browse URLs, share URLs, direct wildcard hostnames, and verified E2EE hostnames, plus inline guidance when the required domain settings are not configured yet.


A useful way to think about NFLTR

NFLTR is an operator-controlled identity and relay layer that can expose services, connect agents, open browser terminals, and make more explicit trust claims about encrypted traffic.

Next steps