![]() ![]() Set the endpoint to the IP address you’ll access the server on, along with the port (i.e.Set Allowed IPs to 0.0.0.0/0 to send all traffic across the VPN.(Optionally) Set DNS servers as your local DHCP servers will no longer work as all packets will encrypted and sent across the VPN. ![]() Set the address to the address listed in the peer section of your server config – 100.62.0.2/32.Create from scratch (you could move a pre-created config file too).Open the app and create a new profile (click the +).Install the WireGuard App from the Play store.Use systemd service to start the interface automatically at boot systemctl start enable forward traffic of the client through the server, we need to enable routing on the server echo "_forward = 1" > /etc/sysctl.d/wg.conf Remove the interface with wg-quick ~# wg-quick down wg0 Test the configuration with wg-quick ~# wg-quick up wg0 PostDown = iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE PostUp = iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE We haven’t generated the Client public keys yet, so those will be blank.Wireguard doesn’t support file references at this time. Use the key in the privatekey file in place of.Add as many peer sections as you have clients. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |