{% extends 'base.html' %} {% load crispy_forms_tags %} {% load i18n %} {% block content %}
{% if page_title %}

{{ page_title }}

{% endif %}
{% crispy form %}
{% trans "Display Name" %}

{% blocktrans %} Optional name used only for display in the web interface. {% endblocktrans %}

{% trans "Web Refresh Interval" %}

{% blocktrans %} Interval used to refresh WireGuard status information in the web UI. {% endblocktrans %}

{% trans "Public Address" %}

{% blocktrans %} Public hostname or IP address and UDP port used by peers to connect.
The listen port must be exposed and mapped in your Docker compose (YAML) file. {% endblocktrans %}

{% trans "Interface Keys" %}

{% blocktrans %} WireGuard private and public keys for this interface.
The private key must remain secret. Changing it requires updating all peer configurations. {% endblocktrans %}

{% trans "Internal Network" %}

{% blocktrans %} Internal IP address and netmask used by the WireGuard interface. {% endblocktrans %}

{% trans "DNS Configuration" %}

{% blocktrans %} DNS servers pushed to peers.
Using the internal IP as primary DNS enables internal name resolution and DNS filtering. {% endblocktrans %}

{% trans "Enforce Route Policy" %}

{% blocktrans %} Enforces routing rules defined by routing templates using firewall rules.
Peers with a default route (0.0.0.0/0) are not restricted.

Note: depending on the number of routes and peers, this option may generate a large number of firewall rules. {% endblocktrans %}

{% endblock %} {% block custom_page_scripts %} {% endblock %}