![]() conf files in /etc/wireguard/ and establishes a connection like in the post above. □Īs a simple script was mentioned, let's add one in case someone finds such a setup useful. Those /etc/wireguard/*.conf files scream for a nice, simple ksh script. The second IP is the default gateway (you can check it with 'route show'): doas route add 199.55.111.99 192.168.0.1įor turning the VPN off change back the default gateway: change routing table: doas ifconfig wg0 create wgkey supprscreetprriiivvaatteekeeeeyyyyyyyyyyy= wgpeer ThxxiisxsiissthhxeseerVeRPubliickeeybbccyy= wgendpoint 199.55.111.99 51280 wgaip 0.0.0.0/0 Setting up the connection (here ipv4) has basically two parts. The default (listening) port setting is 51280 but it could be also something else like 51234. Wgaip (AllowedIPs) 0.0.0.0/0 shows that this config accepts any IP. Wgpeer (PublicKey of the vpn server) depends on the country/server, just like the Endpoint IP. The "Address" line shows the private network IP for the connection. Wgkey (PrivateKey) is the same for every server connection, if you generated multiple config files for one key. The DNS server address should be configured in /etc/nf. That's imaginary data here for the example. PublicKey = ThxxiisxsiissthhxeseerVeRPubliickeeybbccyy= ![]() There are many vpn services, here is an example with mullvad. I mean after wireguard has landed in the kernel and there is no need for extra tools like before (wg-quick). ![]() On reddit there were questions about using a commercial vpn config file on OpenBSD.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |