listeningport:9993peer: yX5gFNzlcgtHVG4DGeJJ5AoHWddpv8HA4J7hhCPjYx9ik=endpoint:1.1.1.1:35935allowedips:192.168.1.12/32latesthandshake:1minute,25seconds agotransfer:15.69KiB received,12.02KiB sent Client Install & Config 下载 访问https://www.wireguard.com/install/根据操作系统选择合适的客户端。 Con...
在OpenWrt上,正确配置dns,可以提高上网的效率。另外,一些插件,比如访问国外网站,以及adguardhome等,...
-SERVERPORT=51820#optional -PEERS=1#optional -PEERDNS=auto#optional -ALLOWEDIPS=0.0.0.0/0#Peer addresses allowed -INTERNAL_SUBNET=10.13.13.0/24#Subnet used in VPN tunnel -SERVERURL=100.101.102.103#Wireguard VPN server address volumes: -/opt/wireguard-server/config:/config -/usr/src:/usr/src#...
生成的配置文件路径:/etc/wireguard/client.conf,命令如下: echo "[Interface]PrivateKey = $(cat client_privatekey) # 填写本机的privatekey 内容Address = 10.0.8.10/24DNS = 8.8.8.8MTU = 1420[Peer]PublicKey = $(cat server_publickey) # 填写对端的publickey 内容Endpoint = server公网的IP:50814Allo...
<your server ip>:就是公网 IP <default interface ip>: 就是私网 IP,如:192.168.1.226 docker-compose 内容如下(基于原始内容做了部分调整,调整内容见注释): version: "3.4" services: netmaker: container_name: netmaker image: gravitl/netmaker:v0.9.1 volumes: - ./dnsconfig:/root/config/dnsconfig...
wg genkey | tee server_private_key | wg pubkey > server_public_key 在/etc/wireguard/下创建wg0.conf文件。 vi /etc/wireguard/wg0.conf 文件内容为: [Interface] Address = 10.0.0.1/24 SaveConfig = true PrivateKey = 服务器的私钥(在服务器上生成的server_private_key文件) ...
version:"3.4"services:netmaker:container_name:netmakerimage:gravitl/netmaker:v0.8.2volumes:-/etc/netclient/config:/etc/netclient/config-dnsconfig:/root/config/dnsconfig-/usr/bin/wg:/usr/bin/wg-/data/sqldata/:/root/datacap_add:-NET_ADMINrestart:alwaysnetwork_mode:hostenvironment:SERVER_HOST:...
(个人观感:OSPF Area = WG Config | OSPF Peer = WG Peer | OSPF route = WG AllowedIPs) 3、 WireGuard 安装 官方的安装教程为 [链接] 注意windows 没有官方程序官方工具 Windows 版本建议下载 MSI,本例使用第三方制作的 TunSafe 程序 [链接]
SaveConfig = true ListenPort = 51820 # 监听的 UDP 端口 PrivateKey = < 这里填写 Server 上 privatekey 的内容 > # 下面这两行规则允许访问服务器的内网 PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MAS...
Supports custom DNS server(s) for VPN clients Supports command-line options for managing VPN clients Optimizessysctlsettings for improved VPN performance Improved creation of client config files when usingsudo ...and more! License MIT Sponsor this project ...