Skip to content

Commit bdbd6e1

Browse files
author
Adam Ciarciński
committed
Fix typos
1 parent c96a53b commit bdbd6e1

File tree

3 files changed

+13
-13
lines changed

3 files changed

+13
-13
lines changed

admin-and-features/features-and-configuration/wireguard/create-your-vpn-network.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,15 +75,15 @@ This specifies DNS resolvers and search domains. Supported format is by comma se
7575

7676
### Allowed groups
7777

78-
Here you can specify **what groups (users assigned to those groups) have access to this VPN Location.**
78+
Here you can specify **what groups (users assigned to those groups) have access to this VPN Location.**
7979

8080
{% hint style="warning" %}
8181
By default (if no group is chosen) **all users will have access to this location.**
8282

8383
By defining a group, assigning users to that group and then choosing this group(s) you can restrict access to VPN Locations.
8484
{% endhint %}
8585

86-
### Multi-Factor Authentication for a Location 
86+
### Multi-Factor Authentication for a Location
8787

8888
#### Require MFA for this location
8989

admin-and-features/troubleshooting/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Because of the main routing 10.0.0.0/8 the VPN server routing the network 10.1.1
103103

104104
### Firewall rulles
105105

106-
Another common problem is that **your server on which the gateway is working, has some firewall rules that interfere with VPN network.** Please examine carefully `ufw` and `iptables` (even if ufw is disabled there may be `iptables` rules).
106+
Another common problem is that **your server on which the gateway is working, has some firewall rules that interfere with VPN network.** Please examine carefully `ufw` and `iptables` (even if ufw is disabled there may be `iptables` rules).
107107

108108
### VPN location ACLs
109109

tutorials/step-by-step-setting-up-a-vpn-server/README.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -130,17 +130,17 @@ If you would like to have multiple VPN locations - [please read this tutorial ho
130130

131131
The most common purpose to setup your own VPN is to provide you (and your users - defguard supports multiple users!) **anonimity and privacy** when accessing public internet.
132132

133-
It's great for every day use (if you want to _hide_ your real IP/location) or for example to encrypt **all your traffic when your are in a public location -** like beeing on WIFI in a coffee shop, hotels, etc. - since **most if not all those places do not provide encrypted WIFI (just open hotspots).**
133+
It's great for every day use (if you want to _hide_ your real IP/location) or for example to encrypt **all your traffic when your are in a public location -** like beeing on Wi-Fi in a coffee shop, hotels, etc. - since **most if not all those places do not provide encrypted Wi-Fi (just open hotspots).**
134134

135135
So defguard as a VPN service is one thing, but we need to do few commands on the server, to enable routing all traffic through this server and your VPN. For your convenience those we will explain in detail.
136136

137-
First of all we need a simple & easy way to manage firewall. In order to do so on Debian install UFW (it's automatically installed on Ubuntu):
137+
First of all we need a simple and easy way to manage firewall. In order to do so on Debian install UFW (it's automatically installed on Ubuntu):
138138

139139
```
140140
root@server# apt install ufw
141141
```
142142

143-
Now let's enable on the firewall rules that provide packet forwarding (from your VPN to the Internet and vice-versa).
143+
Now let's enable on the firewall rules that provide packet forwarding (from your VPN to the Internet and vice versa).
144144

145145
Edit the /etc/default/ufw file to enable default policies for packet forwarding to ACCEPT
146146

@@ -182,10 +182,10 @@ Now just add the following to /etc/ufw/before.rules **just before the filter rul
182182
*nat
183183
:POSTROUTING ACCEPT [0:0]
184184
185-
# Forward VPN network traffic through ens18 - Change to match you out-interface
185+
# Forward VPN network traffic through ens18 - Change to match your egress interface
186186
-A POSTROUTING -s 10.22.33.0/24 -o ens18 -j MASQUERADE
187187
188-
# don't delete the 'COMMIT' line or these nat table rules won't
188+
# don't delete the 'COMMIT' line or these NAT table rules won't
189189
# be processed
190190
COMMIT
191191
```
@@ -199,19 +199,19 @@ root@server# ufw allow https
199199
# allow WireGuard VPN which is on port 50555 with UDP protocol
200200
root@server# ufw allow 50555/udp
201201
202-
# also you might consider for the time beeing to allow SSH management
202+
# for the time being, you might also consider to allow SSH management
203203
# until you learn how to allow traffic to SSH from VPN
204204
root@server# ufw allow ssh
205205
```
206206

207-
On Ubuntu UFW is enabled, but on Debian we need to enable it:
207+
On Ubuntu, UFW is enabled by default, but on Debian it has to be enabled manually:
208208

209209
<pre><code><strong>root@server# ufw enable
210210
</strong>Command may disrupt existing ssh connections. Proceed with operation (y|n)? y
211211
Firewall is active and enabled on system startup
212212
</code></pre>
213213

214-
On ubuntu we need to realod the configuration:
214+
On Ubuntu, we need to reload the configuration:
215215

216216
<pre><code><strong>root@server# ufw reload
217217
</strong></code></pre>
@@ -237,11 +237,11 @@ To Action From
237237

238238
#### Testing your configuration with defguard client
239239

240-
Defguard is the only (known to us) WireGuard client, that enables to choose during connetion if you would like to **route all your traffic through the VPN.** Just (before connecting) choose the option: **Allow all traffic** and click connect!
240+
Defguard is the only (known to us) WireGuard client that during connection provides a choice to **route all your traffic through the VPN.** Just (before connecting) choose the option: **Allow all traffic** and click connect!
241241

242242
<figure><img src="../../.gitbook/assets/SCR-20240118-smil.png" alt=""><figcaption><p>Choosing to forward all traffic through VPN</p></figcaption></figure>
243243

244-
This is very usefull, since some of the times you just want to be connected to your VPN to have the server/vpn networks accessible, and sometimes (like in the scenarious mentioned before) you want to hide and encrypt your traffic.
244+
This is very usefull, since some of the times you just want to be connected to your VPN to have the server/VPN networks accessible, and sometimes (like in the scenarious mentioned before) you want to hide and encrypt your traffic.
245245

246246
In order to check if everything works, let's visit a website [https://ifconfig.co](https://ifconfig.co) - that will show our public IP. If everything went smootly, you should see **your VPN server public IP** (which in our example is: _185.33.37.51_):
247247

0 commit comments

Comments
 (0)