Nftables to go
This commit is contained in:
@@ -12,8 +12,6 @@ cat <<EOF > /etc/wireguard/wg0.conf
|
||||
PrivateKey = $(cat /etc/wireguard/server_priv.key)
|
||||
Address = 10.0.0.1/24 # Server has IP in the wg network
|
||||
ListenPort = 51820
|
||||
#PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||
#PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
||||
EOF
|
||||
|
||||
# Enable IP forwarding, persistent
|
||||
|
||||
@@ -1,11 +0,0 @@
|
||||
{
|
||||
"description": "Allow VPN traffic through Wireguard interface",
|
||||
"filter": [
|
||||
{
|
||||
"in": "VPN",
|
||||
"service": [ "ssh", "dns", "ping", "http", "https" ],
|
||||
"action": "accept",
|
||||
"src": "10.0.0.1/24"
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -1,14 +0,0 @@
|
||||
{
|
||||
"description": "Allow Wireguard server access from the internet",
|
||||
"service": {
|
||||
"wireguard": { "port": 51820, "proto": "udp" }
|
||||
},
|
||||
"filter": [
|
||||
{
|
||||
"in": "WAN",
|
||||
"out": "_fw",
|
||||
"service": "wireguard",
|
||||
"action": "accept"
|
||||
}
|
||||
]
|
||||
}
|
||||
Reference in New Issue
Block a user