User Tools

Site Tools


network:vpn:wireguard_access_to_home_network_using_pikvm

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
network:vpn:wireguard_access_to_home_network_using_pikvm [2023/05/14 22:04] adminnetwork:vpn:wireguard_access_to_home_network_using_pikvm [2024/11/17 13:30] (current) admin
Line 69: Line 69:
 AllowedIPs=10.0.0.4/32 AllowedIPs=10.0.0.4/32
 ``` ```
 +
 +After adding peers use `systemctl restart systemd-networkd` to load the new configuration.
  
 `/etc/systemd/network/99-wg0.network`: `/etc/systemd/network/99-wg0.network`:
Line 87: Line 89:
 [Interface] [Interface]
 Address = 10.0.0.2/24 Address = 10.0.0.2/24
-ListenPort = 51820+DNS = 192.168.1.1 
 +ListenPort = 38865 
 +MTU = 1330
 PrivateKey = <best generated on the client> PrivateKey = <best generated on the client>
 [Peer] [Peer]
Line 93: Line 97:
 PresharedKey = <contents of peer_A-peer_B.psk> PresharedKey = <contents of peer_A-peer_B.psk>
 AllowedIps = 10.0.0.0/24,<in home private IPv4 network: e.g 192.168.x.0/24>,<more in home networks if needed>  AllowedIps = 10.0.0.0/24,<in home private IPv4 network: e.g 192.168.x.0/24>,<more in home networks if needed> 
-Endpoint = <DNS resolveable hostname of public IP>:51820+Endpoint = <DNS resolveable hostname of public IP>:38865(51820)
 ``` ```
  
network/vpn/wireguard_access_to_home_network_using_pikvm.1684094675.txt.gz · Last modified: by admin