
Adding peers to the wg0 Interface # Remote User set interfaces wireguard wg0 peer set interfaces wireguard wg0 peer /home/user/my_phone/pubkey allowed-ips commit saveĥ. # Port for WG (that peers will set interfaces wireguard wg0 listen-port commit saveĤ. # Creates entries in the route table for the VPN set interfaces wireguard wg0 route-allowed-ips true # This subnet can be any private IP range, through check for set interfaces wireguard wg0 address 10.6.69.1/24 # Creates the Gateway IP for the VPN and the subnet # The location of the server's private key, previously set interfaces wireguard wg0 private-key /home/user/server/privatekey wg0 Interface Configuration # Enter configure mode You then should have two directories one called server_keys and my_phone. # Generate a key pair for the my_phone peer, in the my_phone wg genkey | tee privatekey | wg pubkey > publickey

# Create a folder for the peer's mkdir my_phone The peer key pair can be generated on any device, however it’s more convenient to store all the keys on the router. OUCXb+z4M6d0HCdJq2MB9WQLS8S1JsUYNM3vQTAkFmU=Ģ. You can use the cat linux command to see the contents of the keyfile. # Currently in the server_keys Generate the wg genkey | tee privatekey | wg pubkey > publickey # Create a folder for the server's mkdir server_keys Generating Server Key Pair #įirst we will need to generate a key pair for the wireguard server. Wg0 Show specified wireguard interface information Transfer Show wireguard interface transfer statistics Public-key Show wireguard interface public key Private-key Show wireguard interface private key Preshared-keys Show wireguard interface preshared keys Persistent-keepalive Show wireguard interface persistent keepalive Listen-port Show wireguard interface listen port Latest-handshakes Show wireguard interface latest-handshakes # show interfaces wireguardĪllowed-ips Show wireguard interface allowed ipsĭetail Show detailed WireGuard interface informationĮndpoints Show wireguard interface endpoints To verify installation, Wireguard should appear in the show interfaces menu.
#X VPN REDDIT INSTALL#
To install the package, use the dpkg command.
#X VPN REDDIT SOFTWARE#
rw-r-r- 1 user users 153820 Oct 17 16:14 bīefore installation, ensure you have the downloaded the correct fie for your Edgerouter variant and software version. #įor example, on an ER-X with v2 software, use curl in this example: curl -OL deb for your EdgeRouter variant and software version from the WireGuard github repository. There is a Web UI for basic configuration, and a Juniper-style CLI for more advanced functions.

The EdgeRouter devices come with Ubiquiti’s Debian Linux based EdgeOS, which is a fork of Vyatta. The EdgeRouter-X costs £50, and has some enterprise grade features and dynamic routing protocols such as BGP, MPLS, OSPF, QoS, RIP, DNAT, SNAT, DPI, etc.

Ubiquiti’s EdgeRouter lineup is a relatively inexpensive platform which provides a large range of features. Some complex mathematical authentication happens, and you have a UDP tunnel which packets can traverse. WireGuard’s speed and elegance are the main reasons for its popularity, it is significantly faster than OpenVPN & IPsec - in terms of raw throughput, authentication speed and latency.Īt a fundamental level, WireGuard works by creating an interface and dictating some details such as: WireGuard’s codebase has only 4,000 lines of code, which is considerably less than OpenVPN’s, which has 600,000. It aims to be faster, simpler, leaner, and more useful than alternatives such as IPsec & OpenVPN. WireGuard is an extremely simple yet fast and modern VPN that utilizes modern cryptography.
