Install apt install wireguard or pkg/brew install wireguard-tools on each node Generate public and private keys locally on each node wg genkey+wg pubkey Create a wg0.conf WireGuard config file on the main relay server [Interface] Make sure to specify a CIDR range for the entire VPN ...
Create a wg0.conf wireguard config file on the main relay server [Interface] Make sure to specify a CIDR range for the entire VPN subnet when defining the address the server accepts routes for Address = 10.0.0.1/24 [Peer] Create a peer section for every client joining the VPN, using ...
Saltstack formula for wireguard. Contribute to MEschenbacher/wireguard-formula development by creating an account on GitHub.
Create a wg0.conf wireguard config file on the main relay server [Interface] Make sure to specify a CIDR range for the entire VPN subnet when defining the address the server accepts routes for Address = 10.0.0.1/24 [Peer] Create a peer section for every client joining the VPN, using ...
Create awg0.confWireGuard config file on the main relay server [Interface]Make sure to specify a CIDR range for the entire VPN subnet when defining the address the server accepts routes forAddress = 192.0.2.1/24 [Peer]Create a peer section for every client joining the VPN, using their corre...
enabled: false # Enabling this option makes devices prefer a random port for WireGuard traffic over the # default static port 41641. This option is intended as a workaround for some buggy # firewall devices. See https://tailscale.com/kb/1181/firewalls/ for more information. randomize...
Dockerfile.debug Dockerfile.tailscale-HEAD LICENSE Makefile README.md buf.gen.yaml config-example.yaml derp-example.yaml flake.lock flake.nix go.mod go.sum mkdocs.yml swagger.go Breadcrumbs headscale / config-example.yaml Latest commit
An open source, self-hosted implementation of the Tailscale control server - headscale/config-example.yaml at 5f9c26930ce796284a8fc7ad167f76e187813d64 · juanfont/headscale
Create awg0.confWireGuard config file on the main relay server [Interface]Make sure to specify a CIDR range for the entire VPN subnet when defining the address the server accepts routes forAddress = 192.0.2.1/24 [Peer]Create a peer section for every client joining the VPN, using their corre...
Create a wg0.conf WireGuard config file on the main relay server [Interface] Make sure to specify a CIDR range for the entire VPN subnet when defining the address the server accepts routes for Address = 192.0.2.1/24 [Peer] Create a peer section for every client joining the VPN, using ...