change subnet to deconflict with home

This commit is contained in:
Tyler Starr 2023-10-08 20:59:04 -07:00
parent 4aaec6d0a9
commit 4ece67f17b
6 changed files with 9 additions and 9 deletions

View File

@ -1,6 +1,6 @@
[Interface] [Interface]
# your own IP on the wireguard network # your own IP on the wireguard network
Address = 192.168.2.2/24 Address = 192.168.3.2/24
PrivateKey = {{ (secret "Wireguard - Adjudicator Secret" "NOTES") }} PrivateKey = {{ (secret "Wireguard - Adjudicator Secret" "NOTES") }}
[Peer] [Peer]

View File

@ -1,6 +1,6 @@
[Interface] [Interface]
# your own IP on the wireguard network # your own IP on the wireguard network
Address = 192.168.2.4/24 Address = 192.168.3.4/24
PrivateKey = {{ (secret "Wireguard - Bulwark Secret" "NOTES") }} PrivateKey = {{ (secret "Wireguard - Bulwark Secret" "NOTES") }}
[Peer] [Peer]

View File

@ -91,7 +91,7 @@
#wireguard-client = { #wireguard-client = {
# enable = true; # enable = true;
# privateKeyFile = "/home/${user}/.wireguard/bulwark"; # privateKeyFile = "/home/${user}/.wireguard/bulwark";
# address = [ "192.168.2.4/24" ]; # address = [ "192.168.3.4/24" ];
# publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ="; # publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ=";
# endpoint = "66.218.43.87"; # endpoint = "66.218.43.87";
#}; #};

View File

@ -101,7 +101,7 @@
wireguard-client = { wireguard-client = {
enable = true; enable = true;
privateKeyFile = "/home/${user}/.wireguard/kestrel"; privateKeyFile = "/home/${user}/.wireguard/kestrel";
address = [ "192.168.2.3/24" ]; address = [ "192.168.3.3/24" ];
publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ="; publicKey = "bd7bbZOngl/FTdBlnbIhgCLNf6yx5X8WjiRB7E1NEQQ=";
endpoint = "66.218.43.87"; endpoint = "66.218.43.87";
}; };

View File

@ -7,7 +7,7 @@
server string = smbnix server string = smbnix
netbios name = smbnix netbios name = smbnix
security = user security = user
hosts allow = 192.168.2. 192.168.1. 127.0.0.1 localhost hosts allow = 192.168.3. 192.168.1. 127.0.0.1 localhost
hosts deny = 0.0.0.0/0 hosts deny = 0.0.0.0/0
guest account = nobody guest account = nobody
map to guest = bad user map to guest = bad user

View File

@ -18,7 +18,7 @@
# "wg0" is the network interface name. You can name the interface arbitrarily. # "wg0" is the network interface name. You can name the interface arbitrarily.
wg0 = { wg0 = {
# Determines the IP/IPv6 address and subnet of the client's end of the tunnel interface # Determines the IP/IPv6 address and subnet of the client's end of the tunnel interface
address = [ "192.168.2.1/24" ]; address = [ "192.168.3.1/24" ];
# The port that WireGuard listens to - recommended that this be changed from default # The port that WireGuard listens to - recommended that this be changed from default
listenPort = 51820; listenPort = 51820;
# Path to the server's private key # Path to the server's private key
@ -43,17 +43,17 @@
{ {
# Adjudicator # Adjudicator
publicKey = "r2/IeYCO1T+l248387wUBoNnc2DK9O8pHcIr/NQqezM="; publicKey = "r2/IeYCO1T+l248387wUBoNnc2DK9O8pHcIr/NQqezM=";
allowedIPs = [ "192.168.2.2/32" ]; allowedIPs = [ "192.168.3.2/32" ];
} }
{ {
# Kestrel # Kestrel
publicKey = "hPso657fppLYvBU31Rtqqg792JEoPv7r82JgLoF8S2Y="; publicKey = "hPso657fppLYvBU31Rtqqg792JEoPv7r82JgLoF8S2Y=";
allowedIPs = [ "192.168.2.3/32" ]; allowedIPs = [ "192.168.3.3/32" ];
} }
{ {
# Bulwark # Bulwark
publicKey = "CDoy/XI8FRQV/ySHigLWG2tpWVw8hgEZXRQCEE3qYHQ="; publicKey = "CDoy/XI8FRQV/ySHigLWG2tpWVw8hgEZXRQCEE3qYHQ=";
allowedIPs = [ "192.168.2.4/32" ]; allowedIPs = [ "192.168.3.4/32" ];
} }
# More peers can be added here. # More peers can be added here.
]; ];