You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: admin-and-features/troubleshooting/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,7 +103,7 @@ Because of the main routing 10.0.0.0/8 the VPN server routing the network 10.1.1
103
103
104
104
### Firewall rulles
105
105
106
-
Another common problem is that **your server on which the gateway is working, has some firewall rules that interfere with VPN network.** Please examine carefully `ufw` and `iptables` (even if ufw is disabled there may be `iptables` rules).
106
+
Another common problem is that **your server on which the gateway is working, has some firewall rules that interfere with VPN network.** Please examine carefully `ufw` and `iptables` (even if ufw is disabled there may be `iptables` rules).
Copy file name to clipboardExpand all lines: tutorials/step-by-step-setting-up-a-vpn-server/README.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,17 +130,17 @@ If you would like to have multiple VPN locations - [please read this tutorial ho
130
130
131
131
The most common purpose to setup your own VPN is to provide you (and your users - defguard supports multiple users!) **anonimity and privacy** when accessing public internet.
132
132
133
-
It's great for every day use (if you want to _hide_ your real IP/location) or for example to encrypt **all your traffic when your are in a public location -** like beeing on WIFI in a coffee shop, hotels, etc. - since **most if not all those places do not provide encrypted WIFI (just open hotspots).**
133
+
It's great for every day use (if you want to _hide_ your real IP/location) or for example to encrypt **all your traffic when your are in a public location -** like beeing on Wi-Fi in a coffee shop, hotels, etc. - since **most if not all those places do not provide encrypted Wi-Fi (just open hotspots).**
134
134
135
135
So defguard as a VPN service is one thing, but we need to do few commands on the server, to enable routing all traffic through this server and your VPN. For your convenience those we will explain in detail.
136
136
137
-
First of all we need a simple & easy way to manage firewall. In order to do so on Debian install UFW (it's automatically installed on Ubuntu):
137
+
First of all we need a simple and easy way to manage firewall. In order to do so on Debian install UFW (it's automatically installed on Ubuntu):
138
138
139
139
```
140
140
root@server# apt install ufw
141
141
```
142
142
143
-
Now let's enable on the firewall rules that provide packet forwarding (from your VPN to the Internet and vice-versa).
143
+
Now let's enable on the firewall rules that provide packet forwarding (from your VPN to the Internet and viceversa).
144
144
145
145
Edit the /etc/default/ufw file to enable default policies for packet forwarding to ACCEPT
146
146
@@ -182,10 +182,10 @@ Now just add the following to /etc/ufw/before.rules **just before the filter rul
182
182
*nat
183
183
:POSTROUTING ACCEPT [0:0]
184
184
185
-
# Forward VPN network traffic through ens18 - Change to match you out-interface
185
+
# Forward VPN network traffic through ens18 - Change to match your egress interface
186
186
-A POSTROUTING -s 10.22.33.0/24 -o ens18 -j MASQUERADE
187
187
188
-
# don't delete the 'COMMIT' line or these nat table rules won't
188
+
# don't delete the 'COMMIT' line or these NAT table rules won't
# allow WireGuard VPN which is on port 50555 with UDP protocol
200
200
root@server# ufw allow 50555/udp
201
201
202
-
# also you might consider for the time beeing to allow SSH management
202
+
# for the time being, you might also consider to allow SSH management
203
203
# until you learn how to allow traffic to SSH from VPN
204
204
root@server# ufw allow ssh
205
205
```
206
206
207
-
On Ubuntu UFW is enabled, but on Debian we need to enable it:
207
+
On Ubuntu, UFW is enabled by default, but on Debian it has to be enabled manually:
208
208
209
209
<pre><code><strong>root@server# ufw enable
210
210
</strong>Command may disrupt existing ssh connections. Proceed with operation (y|n)? y
211
211
Firewall is active and enabled on system startup
212
212
</code></pre>
213
213
214
-
On ubuntu we need to realod the configuration:
214
+
On Ubuntu, we need to reload the configuration:
215
215
216
216
<pre><code><strong>root@server# ufw reload
217
217
</strong></code></pre>
@@ -237,11 +237,11 @@ To Action From
237
237
238
238
#### Testing your configuration with defguard client
239
239
240
-
Defguard is the only (known to us) WireGuard client, that enables to choose during connetion if you would like to **route all your traffic through the VPN.** Just (before connecting) choose the option: **Allow all traffic** and click connect!
240
+
Defguard is the only (known to us) WireGuard client that during connection provides a choice to **route all your traffic through the VPN.** Just (before connecting) choose the option: **Allow all traffic** and click connect!
241
241
242
242
<figure><imgsrc="../../.gitbook/assets/SCR-20240118-smil.png"alt=""><figcaption><p>Choosing to forward all traffic through VPN</p></figcaption></figure>
243
243
244
-
This is very usefull, since some of the times you just want to be connected to your VPN to have the server/vpn networks accessible, and sometimes (like in the scenarious mentioned before) you want to hide and encrypt your traffic.
244
+
This is very usefull, since some of the times you just want to be connected to your VPN to have the server/VPN networks accessible, and sometimes (like in the scenarious mentioned before) you want to hide and encrypt your traffic.
245
245
246
246
In order to check if everything works, let's visit a website [https://ifconfig.co](https://ifconfig.co) - that will show our public IP. If everything went smootly, you should see **your VPN server public IP** (which in our example is: _185.33.37.51_):
0 commit comments