Skip to content

Commit

Permalink
requested changes
Browse files Browse the repository at this point in the history
  • Loading branch information
NittanySeaLion committed Dec 19, 2023
1 parent 3924863 commit 129601b
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
10 changes: 5 additions & 5 deletions docs/guides/vpn/wireguard/client.md
Original file line number Diff line number Diff line change
Expand Up @@ -169,9 +169,9 @@ Next, add your server as peer for this client:

```bash
echo "[Peer]" > "${name}.conf"
echo "AllowedIPs = 10.100.0.1/32, fd08:4711::1/128" > "${name}.conf"
echo "Endpoint = [your public IP or domain]:47111" > "${name}.conf" # Edit to add your Internet facing device
echo "PersistentKeepalive = 25" > "${name}.conf"
echo "AllowedIPs = 10.100.0.1/32, fd08:4711::1/128" >> "${name}.conf"
echo "Endpoint = [your public IP or domain]:47111" >> "${name}.conf" # Edit to add your Internet facing device
echo "PersistentKeepalive = 25" >> "${name}.conf"
```

Then add the public key of the server as well as the PSK for this connection:
Expand Down Expand Up @@ -202,13 +202,13 @@ That's it.
You can now copy the configuration file to your client (if you created the config on the server). If the client is a mobile device such as a phone, `qrencode` can be used to generate a scanable QR code:

```bash
sudo qrencode -t ansiutf8 < "/etc/wireguard/${name}.conf"
qrencode -t ansiutf8 < "/etc/wireguard/${name}.conf"
exit
```

(you may need to install `qrencode` using `sudo apt-get install qrencode`)

You can directly scan this QR code with the official WireGuard app after clicking on the blue plus symbol in the lower right corner.
You can directly scan this QR code with the official WireGuard app after clicking on the blue plus symbol in the lower right corner. You can also run `sudo qrencode -t ansiutf8 < "/etc/wireguard/[client_name].conf"` to display the QR code after exiting sudo mode.

## Connect to your WireGuard VPN

Expand Down
4 changes: 2 additions & 2 deletions docs/guides/vpn/wireguard/server.md
Original file line number Diff line number Diff line change
Expand Up @@ -180,8 +180,8 @@ But if you are using `unbound` to provide a recursive DNS server solution based

```bash
sudo -i
sudo echo "access-control: 192.168.1.0/24 allow" >> /etc/unbound/unbound.conf.d/pi-hole.conf
sudo /etc/init.d/unbound restart
echo "access-control: 192.168.1.0/24 allow" >> /etc/unbound/unbound.conf.d/pi-hole.conf
systemctl restart unbound
exit
```

Expand Down

0 comments on commit 129601b

Please sign in to comment.