From 129601b3de4ea3c696ea7643cbfdb4bdc3ca2893 Mon Sep 17 00:00:00 2001 From: NittanySeaLion <119230128+NittanySeaLion@users.noreply.github.com> Date: Tue, 19 Dec 2023 18:55:56 -0500 Subject: [PATCH] requested changes --- docs/guides/vpn/wireguard/client.md | 10 +++++----- docs/guides/vpn/wireguard/server.md | 4 ++-- 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/docs/guides/vpn/wireguard/client.md b/docs/guides/vpn/wireguard/client.md index 571ef521a..40fdc6bf9 100644 --- a/docs/guides/vpn/wireguard/client.md +++ b/docs/guides/vpn/wireguard/client.md @@ -169,9 +169,9 @@ Next, add your server as peer for this client: ```bash echo "[Peer]" > "${name}.conf" -echo "AllowedIPs = 10.100.0.1/32, fd08:4711::1/128" > "${name}.conf" -echo "Endpoint = [your public IP or domain]:47111" > "${name}.conf" # Edit to add your Internet facing device -echo "PersistentKeepalive = 25" > "${name}.conf" +echo "AllowedIPs = 10.100.0.1/32, fd08:4711::1/128" >> "${name}.conf" +echo "Endpoint = [your public IP or domain]:47111" >> "${name}.conf" # Edit to add your Internet facing device +echo "PersistentKeepalive = 25" >> "${name}.conf" ``` Then add the public key of the server as well as the PSK for this connection: @@ -202,13 +202,13 @@ That's it. You can now copy the configuration file to your client (if you created the config on the server). If the client is a mobile device such as a phone, `qrencode` can be used to generate a scanable QR code: ```bash -sudo qrencode -t ansiutf8 < "/etc/wireguard/${name}.conf" +qrencode -t ansiutf8 < "/etc/wireguard/${name}.conf" exit ``` (you may need to install `qrencode` using `sudo apt-get install qrencode`) -You can directly scan this QR code with the official WireGuard app after clicking on the blue plus symbol in the lower right corner. +You can directly scan this QR code with the official WireGuard app after clicking on the blue plus symbol in the lower right corner. You can also run `sudo qrencode -t ansiutf8 < "/etc/wireguard/[client_name].conf"` to display the QR code after exiting sudo mode. ## Connect to your WireGuard VPN diff --git a/docs/guides/vpn/wireguard/server.md b/docs/guides/vpn/wireguard/server.md index c7a9a7aaf..d2a1584f4 100644 --- a/docs/guides/vpn/wireguard/server.md +++ b/docs/guides/vpn/wireguard/server.md @@ -180,8 +180,8 @@ But if you are using `unbound` to provide a recursive DNS server solution based ```bash sudo -i -sudo echo "access-control: 192.168.1.0/24 allow" >> /etc/unbound/unbound.conf.d/pi-hole.conf -sudo /etc/init.d/unbound restart +echo "access-control: 192.168.1.0/24 allow" >> /etc/unbound/unbound.conf.d/pi-hole.conf +systemctl restart unbound exit ```