Skip to content

Wireguard Multi-Site VPN

Notifications You must be signed in to change notification settings

a4649/wireguard-multi-site

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WireGuard Multi-Site VPN

diagram

Ensure you have TCP and UPD ports forwarding to the wireguard instances eth IP Address in your router/gateway

Ensure you have wireguard kernel module active:

modinfo wireguard

Ensure you have wireguard-tools installed:

dnf install wireguard-tools

Ensure you have IPv4 forwarding enabled and IPv6 disabled in /etc/sysctl.conf:

net.ipv4.ip_forward = 1
net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1
net.ipv6.conf.lo.disable_ipv6 = 1

If you use firewalld ensure you have masquerade and ports enabled:

firewall-cmd --add-port=15380/tcp
firewall-cmd --add-port=15380/udp
firewall-cmd --zone=public --add-masquerade

Connect tunnels at boot time:

systemctl enable wg-quick@wg0.conf

Split-tunnel by default

If you want full-tunnel in your sites, change sites B, C and D configuration files:

AllowedIPs = 0.0.0.0/0

To route all traffic through wireguard tunnel in order to use site-A to reach internet

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy