Zelogx MSL Setup – The Multi-tenant Enabler for Proxmox.

Zelogx MSL Setup (Multiverse Secure Lab Setup) – The Multi-tenant Enabler is is a multi-tenant setup tool that virtually partitions a single Proxmox server into isolated environments for each project or team. By automatically attaching a dedicated VPN to each tenant, it lets authorized users securely reach the right project zone from anywhere. Concretely, it configures Proxmox SDN (Simple Zones + VNets) and firewall rules for you, transforming a plain hypervisor into a collection of multi-tenant–ready virtual spaces. With GUI-based VPN management (Pritunl) and MFA, it minimizes operational overhead while keeping robustness enforced by mechanisms rather than manual discipline.

WHAT MSL-Setup BUILDS

MSL Setup – The Multi-tenant Enabler builds a robust, sustainable multi-tenant mechanism with secure and easy operations

Value comes from the combination of multiple features: L2-isolated reliable tenant networks, access control that allows VPN users to reach only the networks of the projects they belong to, and pre-optimized firewall settings — these make operations simple and secure.

Multiverse Isolation

To provide a true multi-tenant environment, isolated L2 networks per project are implemented on a single Proxmox host. This enables predictable boundaries for localized incident management.

Proxmox SDN + Pritunl VPN

Clean path for remote access without collapsing segmentation. VPN traffic limited to lab networks only - users' Internet traffic goes directly from VPN client to Internet, not through VPN server.

Manual work risks vs automation value

When manually building FW configs and VPN servers, the real risk isn't effort — it's a single typo. MSL Setup codifies security best practices in shell, so anyone running it gets the same hardened, isolated dev environment. That's the true value of automation.

Auto-generated network diagrams and operation guides

Auto-generates network diagrams for your environment, displayed in Proxmox dashboard node-level Notes. Operation guides are also auto-generated in Pritunl VM Notes for easy reference anytime.

COMPARISON

Why MSL Setup on Proxmox, not 'just Hypervisor' or 'just the cloud'?

At a glance, here's how building multi-tenant dev labs compares when you hand-craft everything on a hypervisor, rent it in the cloud, or standardize on Proxmox + MSL Setup.

Approach / Feature DIY on a hypervisor Public cloud (IaaS) MSL Setup – The Multi-tenant Enabler
Provisioning speed Months of time with design and implementation Security design, implementation and validation required Minutes, fully automated
Multi-tenancy None Comply Comply
Network isolation None Powerful but complex VPC, Security group and subnet design Project-level L2 isolation by default
VPN access Separate VPN design, build, and ops Extra managed VPN service and per-use cost MFA, Built-in Pritunl VPN for every lab
Running cost Low infra, high hidden labor cost High, pay-as-you-go that quietly grows Low — your hardware + reusable automation
  Traditional SI project With MSL Setup Pro
Design effort 2-3 engineers, 300+ hours of design & review 0 hours - architecture is pre-designed
Build time 2-6 weeks of implementation & scripting ~20 minutes on an existing Proxmox host
Security validation Manual, requires security assessment knowledge No validation needed. Validated when reused
Typical cost Hundreds of billable consulting hours One-time per-host license
WHY IT MATTERS

Running Proxmox without a multi-tenant design provides only limited fault isolation and leaves the environment exposed to ransomware and similar attacks.

Deploying a new dev environment without MSL Setup can let a virus from a single partner PC spread across every VM exposed on a flat network, potentially halting your entire business. Don’t underestimate development environments—see the Q&A below.

WHO OWNS THE RISK

Are you allowing the same network and VPN access for all projects, and leaving the security risks of the development environment to the engineers?

Are you asking developers — who aren’t specialists in networking, security, virtualization, cloud IaaS, and infrastructure — to own all of that risk?Most development teams are experts at building business applications. They are not specialists in networking, security, virtualization, cloud IaaS, and infrastructure.Making isolation, VPN, and access control work together requires significant effort and expertise.Are you placing all of these considerations on application/AI engineers and data scientists?MSL Setup – The Multi-tenant Enabler is one answer to the question: 'Who is responsible for development environment security?'

HOW IT WORKS

From definition to tenant access in three steps.

MSL Setup turns "how do we wire this lab?" into a repeatable workflow: define it once, deploy it, then hand out VPN access.

Diagram showing the MSL Setup workflow in three steps: Define, Deploy, and Access. In Define, an interactive shell with automatic network discovery is used to describe MainLAN, VPN and project ranges. In Deploy, Proxmox SDN and Pritunl VPN servers are provisioned for projects PJ01–PJ08 with firewall rules applied. In Access, VPN profiles are generated for each user so they connect only to their own isolated project lab.
FIELD NOTES

Playbooks & whitepapers for real-world MSL Setup

Short, opinionated write-ups on how MSL Setup actually changes day-to-day operations: not just "release notes", but practical notes you can reuse for your own lab.

NEXT STEP

Choose your path and get started

Compare editions on the Pricing page and choose the plan that fits your needs.

COMMUNITY

What the community is saying

"~Turning Theory into Reality: True Multi-Tenancy Without Root Access~ Learn how to transform a single powerful Proxmox node into a secure, multi-tenant cloud. Experts dive deep into the underlying theory and the critical importance of Role-Based Access Control (RBAC). [YouTube Video]: Proxmox Multi-Tenancy: Build an Isolated Cloud on One Node (No Root!)"
— [Reddit Discussion]: Per-project Proxmox GUI access over VPN (RBAC on top of isolated SDN+Pritunl lab) view thread
"~Airtight Silos: Ironclad Isolation with Zero ARP Leaks~ Discover why MSL Setup is so robust. These independent reviews dissect our approach to 'Tupperware-like' hermetic environments and complete Layer 2 isolation using Proxmox SDN. [YouTube Video]: Airtight Proxmox Isolation: The MSL Setup Explained (Stop ARP Leaks!)"
— [Reddit Discussion] Anyone else running multiple isolated dev networks on a single Proxmox host? view thread
"This is a really nice pattern for squeezing multi-tenant style labs out of a single node while still keeping infra ownership and blast radius under control. The 'per-project pool + group + user + SDN zone + RBAC to GUI over VPN' combo seems perfect for small shops, MSP labs and trainings where you want teams to self-serve VMs without ever seeing or touching anything outside their project."
— r/Proxmox view thread
"I started using Proxmox with full virtual networks, a virtual firewall with access to only one physical NIC, so I could test VPN setups. Also to think about how to isolate an OT network effectively. "
— r/Proxmox view thread
"Kudos Been involved in a similar setup. A cluster of 3 servers. It was a big project and with a fixed end date. We got it ready Sunday at 4 am and released it to the user community at 9 on Monday. In my own home lab I do have a small scale setup using OPNsense and SDN and even that takes the home lab to a whole different echelon."
— r/Proxmox view thread
"i do, looks about the same, just other ranges, and all is ipv4 and ive killed ipv6 on all clients by grub command in those networks. i dont want them jailbreaking thier networks, that are jailed for good reasons. And i FUCKING ABSOLUTELY have to salute you for documentation!!!! I'll go ahead and copy that right away. Thanks for that input."
— r/Proxmox view thread
FAQs

Questions, answered.

A few practical answers before you invest time (and money) into your next lab setup.