rename examples

This commit is contained in:
Nick Sweeting
2019-06-24 06:11:21 -04:00
parent 9ec86c0e0f
commit 7163803ff6
62 changed files with 119 additions and 253 deletions

View File

@@ -1 +0,0 @@
WN+bvd3PCWs5Pk3bvl7abWR0c1L6PCWKYRX56mjVYGo=

View File

@@ -1 +0,0 @@
8bSk5fATxg9qdxbK20iTGdrQ7SWvxIBhxdMo+W54pEg=

View File

@@ -1,9 +0,0 @@
#!/bin/bash
# install wireguard on FreeBSD
pkg install wireguard
# install wireguard on Ubuntu
#add-apt-repository ppa:wireguard/wireguard
#apt update
#apt install wireguard

View File

@@ -1,14 +0,0 @@
[Interface]
# Name = home-server.example-vpn.dev
Address = 10.0.0.3/32
ListenPort = 51820
PrivateKey = WN+bvd3PCWs5Pk3bvl7abWR0c1L6PCWKYRX56mjVYGo=
DNS = 1.1.1.1
[Peer]
# Name = public-server1.example-vpn.tld
Endpoint = public-server1.example-vpn.tld:51820
PublicKey = q/+jwmL5tNuYSB3z+t9Caj00Pc1YQ8zf+uNPu/UE1wE=
# routes traffic to itself and entire subnet of peers as bounce server
AllowedIPs = 10.0.0.1/24
PersistentKeepalive = 25

View File

@@ -1 +0,0 @@
OPmibSXYAAcMIYKNsWqr77zY06Kl750AEB1nWQi1T2o=

View File

@@ -1 +0,0 @@
BV5DjXeCugIrjvEZLo4sZ0hN5wveFTH8kOfZ1AIQ5js=

View File

@@ -1,9 +0,0 @@
#!/bin/bash
# install wireguard on Ubuntu
#add-apt-repository ppa:wireguard/wireguard
#apt update
#apt install wireguard
# install wireguard on macOS
brew install wireguard-tools

View File

@@ -1,13 +0,0 @@
[Interface]
# Name = laptop.example-vpn.dev
Address = 10.0.0.4/32
PrivateKey = OPmibSXYAAcMIYKNsWqr77zY06Kl750AEB1nWQi1T2o=
DNS = 1.1.1.1
[Peer]
# Name = public-server1.example-vpn.tld
Endpoint = public-server1.example-vpn.tld:51820
PublicKey = q/+jwmL5tNuYSB3z+t9Caj00Pc1YQ8zf+uNPu/UE1wE=
# routes traffic to itself and entire subnet of peers as bounce server
AllowedIPs = 10.0.0.1/24
PersistentKeepalive = 25

View File

@@ -1 +0,0 @@
WH98AvjKKZ584ZLb69G912bNry2wOda9+kfzm+qbnUw=

View File

@@ -1 +0,0 @@
VpjKa2MQKXuvttXRwJIe0LLYrtFYGQRTtmt8okUGm3A=

View File

@@ -1,4 +0,0 @@
#!/bin/bash
# install wireguard on iOS/Android
echo "Use the iOS App Store / Google Play Store to install WireGuard on your mobile device"

View File

@@ -1,3 +0,0 @@
#!/bin/bash
echo "Use the iOS/Android app to load the wg0.conf file and start Wireguard"

View File

@@ -1,3 +0,0 @@
#!/bin/bash
echo "Use the iOS/Android app to load the wg0.conf file and stop Wireguard"

View File

@@ -1,13 +0,0 @@
[Interface]
# Name = phone.example-vpn.dev
Address = 10.0.0.5/32
PrivateKey = WH98AvjKKZ584ZLb69G912bNry2wOda9+kfzm+qbnUw=
DNS = 1.1.1.1
[Peer]
# Name = public-server1.example-vpn.tld
Endpoint = public-server1.example-vpn.tld:51820
PublicKey = q/+jwmL5tNuYSB3z+t9Caj00Pc1YQ8zf+uNPu/UE1wE=
# routes traffic to itself and entire subnet of peers as bounce server
AllowedIPs = 10.0.0.1/24
PersistentKeepalive = 25

View File

@@ -1,5 +0,0 @@
#!/bin/bash
PEER_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
wg-quick up "$PEER_DIR"/wg0.conf
wg show

View File

@@ -1,5 +0,0 @@
#!/bin/bash
PEER_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
wg-quick down "$PEER_DIR"/wg0.conf
wg show

View File

@@ -1,28 +0,0 @@
[Interface]
# Name = public-server1.example-vpn.tld
Address = 10.0.0.1/24
ListenPort = 51820
PrivateKey = 2P/3ll/TxGTjGqwcWnqJMnjwPqGw7oX1RaXlPfsf2FQ=
DNS = 1.1.1.1
[Peer]
# Name = public-server2.example-vpn.dev
Endpoint = public-server2.example-vpn.dev:51820
PublicKey = SceMEaVZaZfOGtGXjMsoJjhwxKHkb++9wjxqN1vm32s=
AllowedIPs = 10.0.0.2/32
[Peer]
# Name = home-server.example-vpn.dev
Endpoint = home-server.example-vpn.dev:51820
PublicKey = 8bSk5fATxg9qdxbK20iTGdrQ7SWvxIBhxdMo+W54pEg=
AllowedIPs = 10.0.0.3/32
[Peer]
# Name = laptop.example-vpn.dev
PublicKey = BV5DjXeCugIrjvEZLo4sZ0hN5wveFTH8kOfZ1AIQ5js=
AllowedIPs = 10.0.0.4/32
[Peer]
# Name = phone.example-vpn.dev
PublicKey = VpjKa2MQKXuvttXRwJIe0LLYrtFYGQRTtmt8okUGm3A=
AllowedIPs = 10.0.0.5/32

View File

@@ -1,5 +0,0 @@
#!/bin/bash
PEER_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
wg-quick up "$PEER_DIR"/wg0.conf
wg show

View File

@@ -1,5 +0,0 @@
#!/bin/bash
PEER_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
wg-quick down "$PEER_DIR"/wg0.conf
wg show

View File

@@ -1,14 +0,0 @@
[Interface]
# Name = public-server2.example-vpn.dev
Address = 10.0.0.2/32
ListenPort = 51820
PrivateKey = eDwURfg8PhpUAdPp+OA9pQ5oZQYqGqY3LToUORMh220=
DNS = 1.1.1.1
[Peer]
# Name = public-server1.example-vpn.tld
Endpoint = public-server1.example-vpn.tld:51820
PublicKey = q/+jwmL5tNuYSB3z+t9Caj00Pc1YQ8zf+uNPu/UE1wE=
# routes traffic to itself and entire subnet of peers as bounce server
AllowedIPs = 10.0.0.1/24
PersistentKeepalive = 25

View File

@@ -14,4 +14,4 @@ sudo sysctl -p /etc/sysctl.conf
iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i wg0 -o wg0 -m conntrack --ctstate NEW -j ACCEPT
iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -o eth0 -j MASQUERADE
iptables -t nat -A POSTROUTING -s 10.0.44.0/24 -o eth0 -j MASQUERADE

View File

@@ -0,0 +1,12 @@
[Interface]
# Name = server1.example-vpn.tld
Address = 10.0.44.1/24
ListenPort = 51820
PrivateKey = 2P/3ll/TxGTjGqwcWnqJMnjwPqGw7oX1RaXlPfsf2FQ=
DNS = 1.1.1.1
[Peer]
# Name = server2.example-vpn.dev
Endpoint = server2.example-vpn.dev:51820
PublicKey = SceMEaVZaZfOGtGXjMsoJjhwxKHkb++9wjxqN1vm32s=
AllowedIPs = 10.0.44.2/32

View File

@@ -0,0 +1,12 @@
[Interface]
# Name = server2.example-vpn.dev
Address = 10.0.44.2/32
ListenPort = 51820
PrivateKey = eDwURfg8PhpUAdPp+OA9pQ5oZQYqGqY3LToUORMh220=
DNS = 1.1.1.1
[Peer]
# Name = server1.example-vpn.tld
Endpoint = server1.example-vpn.tld:51820
PublicKey = q/+jwmL5tNuYSB3z+t9Caj00Pc1YQ8zf+uNPu/UE1wE=
AllowedIPs = 10.0.44.1/24