mirror of
https://github.com/starr-dusT/dotfiles.git
synced 2025-02-19 19:27:31 -08:00
change subnet to deconflict with home
This commit is contained in:
parent
4aaec6d0a9
commit
4ece67f17b
@ -1,6 +1,6 @@
|
|||||||
[Interface]
|
[Interface]
|
||||||
# your own IP on the wireguard network
|
# your own IP on the wireguard network
|
||||||
Address = 192.168.2.2/24
|
Address = 192.168.3.2/24
|
||||||
PrivateKey = {{ (secret "Wireguard - Adjudicator Secret" "NOTES") }}
|
PrivateKey = {{ (secret "Wireguard - Adjudicator Secret" "NOTES") }}
|
||||||
|
|
||||||
[Peer]
|
[Peer]
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
[Interface]
|
[Interface]
|
||||||
# your own IP on the wireguard network
|
# your own IP on the wireguard network
|
||||||
Address = 192.168.2.4/24
|
Address = 192.168.3.4/24
|
||||||
PrivateKey = {{ (secret "Wireguard - Bulwark Secret" "NOTES") }}
|
PrivateKey = {{ (secret "Wireguard - Bulwark Secret" "NOTES") }}
|
||||||
|
|
||||||
[Peer]
|
[Peer]
|
||||||
|
@ -91,7 +91,7 @@
|
|||||||
#wireguard-client = {
|
#wireguard-client = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
# privateKeyFile = "/home/${user}/.wireguard/bulwark";
|
# privateKeyFile = "/home/${user}/.wireguard/bulwark";
|
||||||
# address = [ "192.168.2.4/24" ];
|
# address = [ "192.168.3.4/24" ];
|
||||||
# publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ=";
|
# publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ=";
|
||||||
# endpoint = "66.218.43.87";
|
# endpoint = "66.218.43.87";
|
||||||
#};
|
#};
|
||||||
|
@ -101,7 +101,7 @@
|
|||||||
wireguard-client = {
|
wireguard-client = {
|
||||||
enable = true;
|
enable = true;
|
||||||
privateKeyFile = "/home/${user}/.wireguard/kestrel";
|
privateKeyFile = "/home/${user}/.wireguard/kestrel";
|
||||||
address = [ "192.168.2.3/24" ];
|
address = [ "192.168.3.3/24" ];
|
||||||
publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ=";
|
publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ=";
|
||||||
endpoint = "66.218.43.87";
|
endpoint = "66.218.43.87";
|
||||||
};
|
};
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
server string = smbnix
|
server string = smbnix
|
||||||
netbios name = smbnix
|
netbios name = smbnix
|
||||||
security = user
|
security = user
|
||||||
hosts allow = 192.168.2. 192.168.1. 127.0.0.1 localhost
|
hosts allow = 192.168.3. 192.168.1. 127.0.0.1 localhost
|
||||||
hosts deny = 0.0.0.0/0
|
hosts deny = 0.0.0.0/0
|
||||||
guest account = nobody
|
guest account = nobody
|
||||||
map to guest = bad user
|
map to guest = bad user
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
# "wg0" is the network interface name. You can name the interface arbitrarily.
|
# "wg0" is the network interface name. You can name the interface arbitrarily.
|
||||||
wg0 = {
|
wg0 = {
|
||||||
# Determines the IP/IPv6 address and subnet of the client's end of the tunnel interface
|
# Determines the IP/IPv6 address and subnet of the client's end of the tunnel interface
|
||||||
address = [ "192.168.2.1/24" ];
|
address = [ "192.168.3.1/24" ];
|
||||||
# The port that WireGuard listens to - recommended that this be changed from default
|
# The port that WireGuard listens to - recommended that this be changed from default
|
||||||
listenPort = 51820;
|
listenPort = 51820;
|
||||||
# Path to the server's private key
|
# Path to the server's private key
|
||||||
@ -43,17 +43,17 @@
|
|||||||
{
|
{
|
||||||
# Adjudicator
|
# Adjudicator
|
||||||
publicKey = "r2/IeYCO1T+l248387wUBoNnc2DK9O8pHcIr/NQqezM=";
|
publicKey = "r2/IeYCO1T+l248387wUBoNnc2DK9O8pHcIr/NQqezM=";
|
||||||
allowedIPs = [ "192.168.2.2/32" ];
|
allowedIPs = [ "192.168.3.2/32" ];
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
# Kestrel
|
# Kestrel
|
||||||
publicKey = "hPso657fppLYvBU31Rtqqg792JEoPv7r82JgLoF8S2Y=";
|
publicKey = "hPso657fppLYvBU31Rtqqg792JEoPv7r82JgLoF8S2Y=";
|
||||||
allowedIPs = [ "192.168.2.3/32" ];
|
allowedIPs = [ "192.168.3.3/32" ];
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
# Bulwark
|
# Bulwark
|
||||||
publicKey = "CDoy/XI8FRQV/ySHigLWG2tpWVw8hgEZXRQCEE3qYHQ=";
|
publicKey = "CDoy/XI8FRQV/ySHigLWG2tpWVw8hgEZXRQCEE3qYHQ=";
|
||||||
allowedIPs = [ "192.168.2.4/32" ];
|
allowedIPs = [ "192.168.3.4/32" ];
|
||||||
}
|
}
|
||||||
# More peers can be added here.
|
# More peers can be added here.
|
||||||
];
|
];
|
||||||
|
Loading…
x
Reference in New Issue
Block a user