![]() # This is your client (e.g., laptop you want toĪllowedIPs = 10.100.100.2/32 nf (your private VPN to access your home/VPC) ![]() PostDown = iptables -t nat -A PREROUTING -p udp -dst 10.100.100.1 -dport 53 -j DNAT -to-destination 10.5.0.1:53 PostDown = iptables -t nat -D POSTROUTING -o wg-ext -j MASQUERADE PostDown = iptables -D FORWARD -i %i -j ACCEPT iptables -D FORWARD -o %i -j ACCEPT PostUp = iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Forward DNS requests on :53 to wg-ext's DSN server ![]() PostUp = iptables -t nat -A POSTROUTING -o wg-ext -j MASQUERADE PostUp = iptables -A FORWARD -i %i -j ACCEPT iptables -A FORWARD -o %i -j ACCEPT PostUp = systemctl start Accept sending and receiving on wg-pvt Once downloaded, add the line FwMark = 45 under and store the file as /etc/wireguard/nf. Start by configuring the external VPN - you'll need to first download this from your commercial VPN provider. ![]() The solution I chose was Wireguard running on a GNU/Linux computer. That way when traveling I didn't have to choose between accessing my internal network and browsing the internet anonymously. browse the internet anonymously (such as through a commercial VPN like ExpressVPN, CyberGhost, PIA, or Mullvad).access my network (say, my home network or my VPC).I wanted a VPN endpoint that would allow me to:
0 Comments
Leave a Reply. |