Zelogx Platform - Demo Gallery
Enjoy the Zelogx mission-driven demo — MSL Setup Pro mission guide
MSL Setup demonstration is coming soon.
This page already contains the full step-by-step scenario so you can reproduce the demo on your own Proxmox host today. Start from Mission 2-2 – Experience the MSL Setup installation to walk through the step-by-step setup.
Table of Contents
- Mission-1 Complete VPN setup
- Mission-2 At the scheduled demo time
- Mission-3 Build VMs inside an isolated environment
- Mission-4 Full isolation — confirm VMs cannot communicate across environments
- Mission-5 Experience the self-care dashboard
Mission 1 - Complete VPN setup. Est. time: 15 minutes
M1-1 - Install the VPN client per the instructions
You may use either Pritunl Client or the OpenVPN client.
- OpenVPN: download at https://openvpn.net/community/
- Pritunl: download at https://client.pritunl.com/#install
Pritunl supports both OpenVPN and WireGuard. Use whichever you prefer.
M1-2 - Configure the VPN client to connect to the demo
-
Save the attachment sent from info@zelogx (for example: demo_20260201_1300_user01.tar).
-
For OpenVPN:
- Extract the .tar and import the included MSLSetupDemo_userXXX_Server06.ovpn into your OpenVPN client.
- Run the OpenVPN GUI, right-click the tray icon, choose Import -> Import file…, and select the .ovpn file.

-
For Pritunl:
- Import the .tar into the Pritunl Client.
- Click the Pritunl tray icon, click Import -> Browse -> select demo_20260201_1300_user01.tar, then click Import.

M1-3 - Verify the VPN connection
Confirm you can connect from the Pritunl client or OpenVPN. For Pritunl, verify:
- The “Online for” value is incrementing.
- A Client Address (IP) is assigned.

Once connected, verify the ping below from Windows Terminal:
PS C:\Users\urname> ping 172.16.21.254
Pinging 172.16.21.254 with 32 bytes of data:
Reply from 172.16.21.254: bytes=32 time=1ms TTL=64
Reply from 172.16.21.254: bytes=32 time=1ms TTL=64
Reply from 172.16.21.254: bytes=32 time=1ms TTL=64
Reply from 172.16.21.254: bytes=32 time=1ms TTL=64
Ping statistics for 172.16.21.254:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 1ms, Average = 1ms
M1-4 - Disconnect and wait
After verification, disconnect the VPN and wait until your scheduled demo time.
Other missions may be running—do not draw attention. Disconnect promptly.
M1 Wrap-up
What this mission demonstrated
- Installing the Pritunl client
- Importing a client profile into the Pritunl client
— Mission1 Accomplished! —
Mission 2 - At the scheduled demo time. Est. time: 20 minutes
M2-1 - VPN connection
You’ll receive another email about an hour before the scheduled demo. Move to a comfortable workspace and be ready. When the demo time arrives, immediately connect the VPN and follow the next instructions.
M2-2 - Experience the MSL Setup installation
Run the commands below and complete the MSL Setup installation within 20 minutes.
M2-2-1 - Log in to the Proxmox dashboard
Proxmox should already be running. Log in to the Proxmox dashboard:
https://172.16.21.1:8006
User name: root
Password: zelogxdemo
Realm: Linux PAM standard authentication
SSH access to the demo environment may be disabled.
M2-2-2 - Start installation from the Proxmox console
After logging in, choose Datacenter -> pve16 and click the >_ Shell button to open the console.

Run the following commands to experience installing MSL Setup Pro. The installer walks you through IP configuration and then automatically builds the environment in around ten minutes.
apt install -y ipcalc jq
cd msl-setup-pro-1.1.1_corporate/
# Setup for English users.
./01_networkSetup.sh
# For Japanese users
./01_networkSetup.sh jp

The installer provides sensible default values so subsequent missions run smoothly. Use the values shown by the installer.
An interactive installer session begins, for example:
==========================================
Phase 1.1: Network Environment Check
==========================================
Welcome to Zelogx Multi-Project Secure Lab Setup
Phase 1: Discovering existing networks...
(a) MainLAN Configuration
Auto-detected MainLAN (vmbr0 network):
Network: 172.16.21.0/24
Gateway: 172.16.21.254
Enter MainLAN CIDR [172.16.21.0/24]:
Enter MainLAN Gateway [172.16.21.254]:
(b) Proxmox VE IP Configuration
Auto-detected Proxmox VE IP (vmbr0):
IP Address: 172.16.21.1
Enter Proxmox VE IP [172.16.21.1]:
If you selected Japanese, the script outputs router configuration instructions requiring manual steps. For English, a similar message appears instructing you to configure static routes and port forwards:
Manual configuration required: Router Configuration (Manual Steps Required)
Please apply the following settings on your router (values expanded):
- Static route: destination 172.31.16.0/21 -> gateway 172.16.21.1
- Port forward (OpenVPN): 11856-11863/UDP -> 172.16.21.9
- Port forward (WireGuard): 15952-15959/UDP -> 172.16.21.9
After completing router setup, proceed to the next phase
Phase 1 Complete: Network Setup Successful
Next Steps:
1. Configure your router (follow instructions from previous step)
2. After router configuration, run:
./02_vpnSetup.sh en
In the demo environment there is no external router, so you can skip actual router configuration and continue.
If needed you can restore pre-setup state:
./0102_setupNetwork.sh --restore
# or for Japanese
./0102_setupNetwork.sh jp --restore
Next, run:
./02_vpnSetup.sh
# for Japanese users
./02_vpnSetup.sh jp
At the end of the script the console prints a URL. Open it and check the Notes section for the initial Pritunl login username and password. You can also restore Pritunl creation if necessary:
./0201_createPritunlVM.sh --destroy
Now set up the self-care portal which lets VPN users access their project-specific Proxmox dashboards and manage VMs within their assigned isolated networks:
./0203_setupSelfCarePortal.sh
# for Japanese users
./0203_setupSelfCarePortal.sh jp
Save the generated Proxmox access accounts shown at the end of the setup — you will use them in Mission 5.
Example output (save these credentials):
Project | Username | Password
--------|-----------------|----------------------------------
pj01 | pj01Admin@pve | EmaSeVzHeqoQnuuY
pj02 | pj02Admin@pve | 5U7MV0QfaTHkO5af
... | ... | ...
This completes the MSL Setup installation. Proceed to the next steps.
M2-3 - Verify the created isolated networks
Open Datacenter -> PVE16 -> Notes in the Proxmox dashboard to view an automatically generated network diagram.

M2-4 - Review the Operation Guide
Check the notes of the pritunl-msl VM in Proxmox to find the initial Pritunl password and Day 1 Operation Guide link.

In Notes you will see:
Pritunl Setup Credentials
Initial Username: pritunl
Initial Password: "xxxxxxxxxxxx"
The Pritunl manual configuration reference and links appear there as well.
M2-5 - Create organizations and users in Pritunl
M2-5-0 - Log in
Open the Pritunl URL (for example: https://172.16.21.9). Use the initial credentials shown earlier (username: pritunl, password: the one displayed in Notes). Change the password if you like.

M2-5-1 - Create organizations
Open the Users tab and add organizations. Create organizations named pj01, pj02, … pj08 to match the isolated networks.

Once created, organizations do not need to be recreated for every demo.
M2-5-2 - Attach organizations to servers
Open the Servers tab. You should see VPN Server01..Server08. Use “Attach Organization” to map pj01 -> Server01, pj02 -> Server02, etc.

M2-5-3 - Start the VPN servers
Start each VPN Server (Server01..Server08) using the Start Server button.

Initial setup is now complete. Ongoing tasks are minimal and usually only required when VPN users change.
M2-5-4 - Add VPN users
Add a user (for example: testuser1) and assign them to an organization such as pj01.

M2-5-5 - Distribute VPN profiles
Click “Click to download profile” next to a user to download a .tar package containing the VPN client profile. Send this profile to remote users securely. They can import it into Pritunl or OpenVPN to connect — the same method you used to connect to the demo.
M2 Wrap-up
What this mission demonstrated
- Ease of installing MSL Setup and speed of isolated environment creation
- Network diagrams and operation guides appear in Proxmox Notes after setup
- Easy initial setup of Pritunl VM created by MSL Setup
- Simple VPN user/profile management via Pritunl
— Mission2 Accomplished! —
Mission 3 - Build a VM (Ubuntu 24.04.3) inside an isolated environment. Est. time: 10 minutes
If you have experience creating VMs on Proxmox you may skip non-essential parts. Key points:
- In the General tab, set the Resource Pool to the target isolated project.
- In the Network tab, set the NIC bridge to the isolated network bridge (vnetpjXX).
M3-1 - Create a VM
Create a VM in the pj01 isolated network.
M3-1-1 - (ISO download step removed)

M3-1-2 - VM creation
Datacenter -> pve16 -> Create VM.
M3-1-2-1 General
Set:
Name: testvm
Resource Pool: pj01 <— Important: assign to the pj01 pool (isolated project)
M3-1-2-2 OS
Select the ISO image: ubuntu-24.04.3-live-server-amd64.iso
M3-1-2-3 System
Click Next.
M3-1-2-4 Disks
Click Next.
M3-1-2-5 CPU
Set Cores: 4
M3-1-2-6 Memory
Click Next.
M3-1-2-7 Network
Set Bridge: vnetpj01 <— Important: attach the NIC to the isolated bridge vnetpj01
M3-1-2-8 Confirm
Click Finish.
M3-1-3 - Verify the VM
Confirm testvm appears under Datacenter -> pve16 and that testvm (101) is listed under Datacenter -> pve16 -> pj01 -> Members.

M3-2 - Install the OS
You may skip this step if you’re short on time. If you install the OS, assign a static IPv4 address rather than using DHCP. For pj01 use the 172.31.16.0/24 network range.
Example configuration:
IPv4 method: Manual
Subnet: 172.31.16.0/24
Address: any address between 172.31.16.1 and 172.31.16.253
Gateway: 172.31.16.254
# Avoid addresses used later in missions: 172.31.16.200 and 172.31.16.201
Name: Server: 1.1.1.1 (use 1.1.1.1 for this mission)
After installation remove the installation media: Datacenter -> pve16 -> VM101(testvm) -> Hardware -> CD/DVD Drive -> Do Not use any media.
M3 Wrap-up
What this mission demonstrated
- How to create a VM in an isolated network by assigning the proper pool and vnet bridge
— Mission3 Accomplished! —
Mission 4 - Confirm complete isolation: VMs in different environments cannot communicate. Est. time: 20 minutes
M4-1 - Overview
Run automated provisioning to create three VMs:
- demo-vm11 and demo-vm12 in pj01
- demo-vm2 in pj02
Open the Proxmox console as shown earlier (Datacenter -> pve16 -> >_ Shell).
M4-2 - Automatically create the three VMs
Run:
cd /root/msl-setup-pro-1.1.1_corporate/
./demo_create_vm11.sh
./demo_create_vm12.sh
./demo_create_vm2.sh
This takes about a minute.
These provisioning scripts are demo-specific and not part of the general product.
M4-3 - Verify created VMs
Check Datacenter -> pve16 for:
- 1000 (demo-vm11)
- 1001 (demo-vm12)
- 2000 (demo-vm2)
Confirm demo-vm11 and demo-vm12 belong to pj01 members, and demo-vm2 belongs to pj02 members.

M4-4 - Connectivity tests
Open the console for VM 1000 (demo-vm11). Login:
User: root Password: zelogx
From VM11, verify connectivity to VM12 (same project):
ping 172.31.16.201 # VM12 address
You should see replies indicating success.
Then verify VM11 cannot reach VM2 (different project):
ping 172.31.17.200 # VM2 address
This should fail (no replies).
Also confirm you can reach the gateway in the same project:
ping 172.31.16.254 # Project gateway
All three VMs use the same credentials. Feel free to test reverse pings, firewall status, and ARP tables if desired.
M4 Wrap-up
What this mission demonstrated
- VMs within the same isolated network can communicate with each other
- VMs in different networks cannot communicate
— Mission4 Accomplished! —
Mission 5 - Experience the Proxmox self-care dashboard. Est. time: 20 minutes
To avoid complications with the VPN profile you used earlier, continue using your current VPN connection and access the Proxmox self-care dashboard for the environment you built.

Each isolated environment provides its own Proxmox dashboard. Example URLs (accessible from MainLAN in this demo):
- pj01: https://172.31.16.254:8006
- pj02: https://172.31.17.254:8006
- pj03: https://172.31.18.254:8006
- pj04: https://172.31.19.254:8006
- pj05: https://172.31.20.254:8006
- pj06: https://172.31.21.254:8006
- pj07: https://172.31.22.254:8006
- pj08: https://172.31.23.254:8006
Use the pj01 Admin credentials displayed at the end of M2-2 to log in to pj01 (realm: “Proxmox VE authentication server”).
You will see only the VMs that belong to that project; shared VMs such as the Pritunl VM (on vmbr0) are not shown. For pj01 you should see:
- 100 (testvm) — may be absent if skipped
- 1000 (demo-vm11)
- 1001 (demo-vm12)
The project admin can start/stop VMs, manage snapshots and backups — but cannot access shared VMs outside the project.
Log in to pj02 similarly and confirm you see only its VMs (for example, 2000 demo-vm2).
Right-click a VM to perform shutdown/start, create snapshots, or start backups. You can also create or delete VMs within the project.
M5 Wrap-up
What this mission demonstrated
- The Pritunl VM on vmbr0 is not part of any project and thus isolated from project networks
- Each isolated network has a Proxmox admin account
- Those admin accounts see only VMs belonging to their project, enabling self-service VM lifecycle operations for VPN users
Mission accomplished!
You have learned:
- How VPN users connect to the VPN servers.
- How to perform an MSL Setup installation.
- How to perform initial Pritunl configuration.
- How easy it is to manage VPN users and profiles.
- How to download VPN profiles for end users.
- How to build VMs in isolated environments.
- How to manage project VMs using the self-care portal.
Thank you for completing the demo. You may disconnect the VPN now. VPN profiles are automatically removed from the server after the demo slot ends, so you can remove them from your client. If you have feedback, please email [email protected].