Wireguard
This supplies the main userspace tooling for using and configuring WireGuard tunnels, including the wg(8) and wg-quick(8) utilities. This project supports Linux, OpenBSD, FreeBSD, macOS, Windows, and Android.
Client
Example Wireguard client config
[Interface]
Address = 10.200.100.8/24 # (1)!
DNS = 10.200.100.1 # (2)!
PrivateKey = "oK56DE9Ue9zK76rAc8pBl6opph+1v36lm7cXXsQKrQM=" # (3)!
[Peer]
PublicKey = "GtL7fZc/bLnqZldpVofMCD6hDjrK28SsdLxevJ+qtKU=" # (4)!
PresharedKey = "/UwcSPg38hW/D9Y3tcS1FOV0K1wuURMbS0sesJEP5ak=" # (5)!
AllowedIPs = 0.0.0.0/0 # (6)!
Endpoint = demo.wireguard.com:51820 # (7)!
- The local IP address and network of the interface on the client node
- DNS server to use for this interface
- Client's private key
- The public key of the server
- The (private) pre-shared key
AllowedIPsis the IP addresses to which requests will be routed over the wiregurard interface. For example,0.0.0.0/0directs all traffic over the- Publically accessible hostname and port for the server.