From 5846ff8a94b9107fcd34f14bc5875c519ee65217 Mon Sep 17 00:00:00 2001 From: <> Date: Sat, 18 May 2024 14:05:24 +0000 Subject: [PATCH] Deployed cdcd9d0d with MkDocs version: 1.6.0 --- images/docker-wireguard/index.html | 4 ++-- search/search_index.json | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/images/docker-wireguard/index.html b/images/docker-wireguard/index.html index 2cac70a751..f4404cfe73 100644 --- a/images/docker-wireguard/index.html +++ b/images/docker-wireguard/index.html @@ -3,7 +3,7 @@ Address = 9.8.7.6/32 DNS = 8.8.8.8 PostUp = DROUTE=$(ip route | grep default | awk '{print $3}'); HOMENET=192.168.0.0/16; HOMENET2=10.0.0.0/8; HOMENET3=172.16.0.0/12; ip route add $HOMENET3 via $DROUTE;ip route add $HOMENET2 via $DROUTE; ip route add $HOMENET via $DROUTE;iptables -I OUTPUT -d $HOMENET -j ACCEPT;iptables -A OUTPUT -d $HOMENET2 -j ACCEPT; iptables -A OUTPUT -d $HOMENET3 -j ACCEPT; iptables -A OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT -PreDown = HOMENET=192.168.0.0/16; HOMENET2=10.0.0.0/8; HOMENET3=172.16.0.0/12; ip route del $HOMENET3 via $DROUTE;ip route del $HOMENET2 via $DROUTE; ip route del $HOMENET via $DROUTE; iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT; iptables -D OUTPUT -d $HOMENET -j ACCEPT; iptables -D OUTPUT -d $HOMENET2 -j ACCEPT; iptables -D OUTPUT -d $HOMENET3 -j ACCEPT +PreDown = DROUTE=$(ip route | grep default | awk '{print $3}'); HOMENET=192.168.0.0/16; HOMENET2=10.0.0.0/8; HOMENET3=172.16.0.0/12; ip route del $HOMENET3 via $DROUTE;ip route del $HOMENET2 via $DROUTE; ip route del $HOMENET via $DROUTE; iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT; iptables -D OUTPUT -d $HOMENET -j ACCEPT; iptables -D OUTPUT -d $HOMENET2 -j ACCEPT; iptables -D OUTPUT -d $HOMENET3 -j ACCEPT
** Note: This is not a supported configuration by Linuxserver.io - use at your own risk.
Site-to-site VPN in server mode requires customizing the AllowedIPs
statement for a specific peer in wg0.conf
. Since wg0.conf
is autogenerated when server vars are changed, it is not recommended to edit it manually.
In order to customize the AllowedIPs
statement for a specific peer in wg0.conf
, you can set an env var SERVER_ALLOWEDIPS_PEER_<peer name or number>
to the additional subnets you'd like to add, comma separated and excluding the peer IP (ie. "192.168.1.0/24,192.168.2.0/24"
). Replace <peer name or number>
with either the name or number of a peer (whichever is used in the PEERS
var).
For instance SERVER_ALLOWEDIPS_PEER_laptop="192.168.1.0/24,192.168.2.0/24"
will result in the wg0.conf entry AllowedIPs = 10.13.13.2,192.168.1.0/24,192.168.2.0/24
for the peer named laptop
.
Keep in mind that this var will only be considered when the confs are regenerated. Adding this var for an existing peer won't force a regeneration. You can delete wg0.conf and restart the container to force regeneration if necessary.
Don't forget to set the necessary POSTUP and POSTDOWN rules in your client's peer conf for lan access.
To help you get started creating a container from this image you can either use docker-compose or the docker cli.
The ARM variants can be built on x86_64 hardware using multiarch/qemu-user-static
Once registered you can define the dockerfile to use with -f Dockerfile.aarch64
.
/config/wg_confs/
. Any file with a .conf
extension in that folder will be treated as a live tunnel config and will be attempted to start. If any of the tunnels fail, all tunnels will be stopped. Tunnels are started in alphabetical order. Managed server conf will continue to be hardcoded to wg0.conf
.PersistentKeepalive
to server config for select peers to survive server IP changes when domain name is used.LOG_CONFS
env var. Remove deprecated add-peer
command./config/templates/peer.conf
and restart/config/coredns/Corefile
and restart)./config/coredns/Corefile
and restart).PEERDNS=auto
setting. Update the add-peer
/show-peer
scripts to utilize the templates and the INTERNAL_SUBNET
var (previously missed, oops).INTERNAL_SUBNET
variable to prevent subnet clashes. Add templates for server and peer confs.show-peer
script and include info on host installed headers.