Anonymous
×
Create a new article
Write your page title here:
We currently have 9 articles on NixSec. Type your article name above or click on one of the titles below and start writing!



    NixSec

    Server

    KEYS: Public key is de CLIENT PUBLIC KEY. Private key is de SERVER PRIVATE KEY.

    [Interface]
    Address = 192.168.1.1/24
    SaveConfig = true
    PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -t nat -A POSTROUTING -o ens192 -j MASQUERADE; iptables -A FORWARD -o %i -j ACCEPT
    PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -t nat -D POSTROUTING -o ens192 -j MASQUERADE; iptables -D FORWARD -o %i -j ACCEPT
    ListenPort = 51820
    PrivateKey = 6ITp3BCB06zhdNNTDJIrJ+/yjq0CtShAaxozJ4y3qmQ=
     
     
    [Peer]
    PublicKey = LKCNpnaPIUAWeXL70xBxt7suhaYgR7K3XSr0ikfCeW4=
    AllowedIPs = 192.168.1.2/24
    

    Client

    KEYS: Private key is CLIENT PRIVATE KEY. Public key is de SERVER PUBLIC KEY.

    [Interface]
    PrivateKey = IGtIoU9vPOhOHJdAbGtNKulG1vFWiEktKb55Kq55O1c=
    Address = 192.168.1.2/24
    DNS = 8.8.8.8, 8.8.4.4, 1.1.1.1, 1.0.0.1
     
    [Peer]
    PublicKey = 0p5T9C0uTSsZ4F9cMDice4PX16jocMfBxcABf25sNy8=
    Endpoint = 1.2.3.4:51820
    AllowedIPs = 0.0.0.0/0