Difference between revisions of "Wireguard"
Jump to navigation
Jump to search
Michael.mast (talk | contribs) |
Michael.mast (talk | contribs) |
||
Line 9: | Line 9: | ||
firewall-cmd --permanent --remove-service=ssh --zone=public | firewall-cmd --permanent --remove-service=ssh --zone=public | ||
firewall-cmd --permanent --zone=internal --change-interface=enp3s0 | firewall-cmd --permanent --zone=internal --change-interface=enp3s0 | ||
+ | firewall-cmd --permanent --add-masquerade | ||
+ | </pre> | ||
+ | *Enable forwarding | ||
+ | <pre> | ||
+ | echo 'net.ipv4.ip_forward = 1' > /etc/sysctl.d/01-sysctl.conf | ||
</pre> | </pre> |
Revision as of 18:21, 5 May 2025
Rocky Linux
Dual NIC wireguard setup
Prerequisite Network Config
- Configure the firewall to only allow the wireguard port, then move the internal interface to the internal zone.
firewall-cmd --permanent --add-port=51820/udp --zone=public firewall-cmd --permanent --remove-service=dhcpv6-client --zone=public firewall-cmd --permanent --remove-service=cockpit --zone=public firewall-cmd --permanent --remove-service=ssh --zone=public firewall-cmd --permanent --zone=internal --change-interface=enp3s0 firewall-cmd --permanent --add-masquerade
- Enable forwarding
echo 'net.ipv4.ip_forward = 1' > /etc/sysctl.d/01-sysctl.conf