Now it's time to change the NAT firewall rules so that our local clients will exit through the WireGuard tunnel. Change IPv4 Upstream gateway to our newly created "se1_gw - 10.64.0.1".Click on the button Display Advanced settings.Click on □ Save and then click on ✔ Apply Changes.Īdd the VPN gateway to the WireGuard tunnel.IPv4 Address: Enter the IP you got from the Mullvad API earlier.IPv4 Configuration Type: Select "Static IPv4".Available network ports: select "tun_wg0". ![]() Public Key: "Qn1QaXYTJJSmJSMw18CGdnFiVM0/Gj/15OdkxbXCSG0=".Endpoint (This is the WireGuard server of your choice IPv4 address): 193.138.218.220.Dynamic Endpoint": Uncheck this so that you're able to manually enter an IP and port. ![]() In the WireGuard → Tunnels overview, click on the pencil button under "Actions" to edit the tunnel.You can find the IP-addresses and Public Keys for the servers in our Servers list. Now we will add the WireGuard server (known as a "Peer" in the web GUI). Interface Addresses: Enter the IP you got when running the curl command earlier.Interface Keys: Enter your private key that you generated earlier ( cat /usr/local/etc/wireguard/privkey).Description: Enter a name for the tunnel.The IP-address to use when configuring your WireGuard interface will be returned and saved in the "mullvad-ip" file.Run curl -d account=YOURMULLVADACCOUNTNUMBER -data-urlencode pubkey=YOURPUBLICKEY | tee mullvad-ip Replace YOURMULLVADACCOUNTNUMBER with your Mullvad account number without any spaces, and replace YOURPUBLICKEY with the pubkey above.Run echo "public wireguard key" cat pubkey echo echo "private wireguard key" cat privkey.Run wg genkey | tee privkey | wg pubkey > pubkey.Generate WireGuard keys and get your IP from our API ![]()
0 Comments
Leave a Reply. |