diff --git a/home/private_dot_wireguard/adjudicator.conf.tmpl b/home/private_dot_wireguard/adjudicator.conf.tmpl index 05f41f91..bc558541 100644 --- a/home/private_dot_wireguard/adjudicator.conf.tmpl +++ b/home/private_dot_wireguard/adjudicator.conf.tmpl @@ -1,6 +1,6 @@ [Interface] # your own IP on the wireguard network -Address = 192.168.2.2/24 +Address = 192.168.3.2/24 PrivateKey = {{ (secret "Wireguard - Adjudicator Secret" "NOTES") }} [Peer] diff --git a/home/private_dot_wireguard/bulwark.conf.tmpl b/home/private_dot_wireguard/bulwark.conf.tmpl index 3623e982..58a300a5 100644 --- a/home/private_dot_wireguard/bulwark.conf.tmpl +++ b/home/private_dot_wireguard/bulwark.conf.tmpl @@ -1,6 +1,6 @@ [Interface] # your own IP on the wireguard network -Address = 192.168.2.4/24 +Address = 192.168.3.4/24 PrivateKey = {{ (secret "Wireguard - Bulwark Secret" "NOTES") }} [Peer] diff --git a/provision/nixos/hosts/bulwark/configuration.nix b/provision/nixos/hosts/bulwark/configuration.nix index c3957772..aeb4c2c7 100644 --- a/provision/nixos/hosts/bulwark/configuration.nix +++ b/provision/nixos/hosts/bulwark/configuration.nix @@ -91,7 +91,7 @@ #wireguard-client = { # enable = true; # privateKeyFile = "/home/${user}/.wireguard/bulwark"; - # address = [ "192.168.2.4/24" ]; + # address = [ "192.168.3.4/24" ]; # publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ="; # endpoint = "66.218.43.87"; #}; diff --git a/provision/nixos/hosts/kestrel/configuration.nix b/provision/nixos/hosts/kestrel/configuration.nix index 4a526710..46593aa8 100644 --- a/provision/nixos/hosts/kestrel/configuration.nix +++ b/provision/nixos/hosts/kestrel/configuration.nix @@ -101,7 +101,7 @@ wireguard-client = { enable = true; privateKeyFile = "/home/${user}/.wireguard/kestrel"; - address = [ "192.168.2.3/24" ]; + address = [ "192.168.3.3/24" ]; publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ="; endpoint = "66.218.43.87"; }; diff --git a/provision/nixos/hosts/torus/samba-server.nix b/provision/nixos/hosts/torus/samba-server.nix index b5a9d67c..b08e1c15 100644 --- a/provision/nixos/hosts/torus/samba-server.nix +++ b/provision/nixos/hosts/torus/samba-server.nix @@ -7,7 +7,7 @@ server string = smbnix netbios name = smbnix security = user - hosts allow = 192.168.2. 192.168.1. 127.0.0.1 localhost + hosts allow = 192.168.3. 192.168.1. 127.0.0.1 localhost hosts deny = 0.0.0.0/0 guest account = nobody map to guest = bad user diff --git a/provision/nixos/hosts/torus/wireguard-server.nix b/provision/nixos/hosts/torus/wireguard-server.nix index 822b739d..653521a4 100644 --- a/provision/nixos/hosts/torus/wireguard-server.nix +++ b/provision/nixos/hosts/torus/wireguard-server.nix @@ -18,7 +18,7 @@ # "wg0" is the network interface name. You can name the interface arbitrarily. wg0 = { # Determines the IP/IPv6 address and subnet of the client's end of the tunnel interface - address = [ "192.168.2.1/24" ]; + address = [ "192.168.3.1/24" ]; # The port that WireGuard listens to - recommended that this be changed from default listenPort = 51820; # Path to the server's private key @@ -43,17 +43,17 @@ { # Adjudicator publicKey = "r2/IeYCO1T+l248387wUBoNnc2DK9O8pHcIr/NQqezM="; - allowedIPs = [ "192.168.2.2/32" ]; + allowedIPs = [ "192.168.3.2/32" ]; } { # Kestrel publicKey = "hPso657fppLYvBU31Rtqqg792JEoPv7r82JgLoF8S2Y="; - allowedIPs = [ "192.168.2.3/32" ]; + allowedIPs = [ "192.168.3.3/32" ]; } { # Bulwark publicKey = "CDoy/XI8FRQV/ySHigLWG2tpWVw8hgEZXRQCEE3qYHQ="; - allowedIPs = [ "192.168.2.4/32" ]; + allowedIPs = [ "192.168.3.4/32" ]; } # More peers can be added here. ];