Use global configuration file and change range to /8
This commit is contained in:
parent
0cd5cb1cf8
commit
6a30a736fb
|
@ -38,7 +38,7 @@
|
||||||
- NEW
|
- NEW
|
||||||
- ESTABLISHED
|
- ESTABLISHED
|
||||||
- RELATED
|
- RELATED
|
||||||
destination_port: "{{ wireguard.port }}"
|
destination_port: "{{ services.wireguard.port }}"
|
||||||
jump: ACCEPT
|
jump: ACCEPT
|
||||||
ip_version: '{{ item.ipv }}'
|
ip_version: '{{ item.ipv }}'
|
||||||
protocol: '{{ item.proto }}'
|
protocol: '{{ item.proto }}'
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
[Interface]
|
[Interface]
|
||||||
Address = {{ wireguard.net.v4.addr }}.1/{{ wireguard.net.v4.range.serv }}, {{ wireguard.net.v6.addr }}:1/{{ wireguard.net.v6.range.serv }}
|
Address = {{ services.wireguard.net.v4.addr }}.1/{{ wireguard.net.v4.range.serv }}, {{ wireguard.net.v6.addr }}:1/{{ wireguard.net.v6.range.serv }}
|
||||||
PostUp = iptables -A FORWARD -i {{ wireguard.interface }} -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i {{ wireguard.interface }} -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
PostUp = iptables -A FORWARD -i {{ services.wireguard.interface }} -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i {{ wireguard.interface }} -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||||
PostDown = iptables -D FORWARD -i {{ wireguard.interface }} -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i {{ wireguard.interface }} -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
PostDown = iptables -D FORWARD -i {{ services.wireguard.interface }} -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i {{ wireguard.interface }} -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
||||||
ListenPort = {{ wireguard.port }}
|
ListenPort = {{ services.wireguard.port }}
|
||||||
PrivateKey = {{ wg.privkey }}
|
PrivateKey = {{ wg.privkey }}
|
||||||
|
|
||||||
{% for user in wireguard.peers %}
|
{% for user in services.wireguard.peers %}
|
||||||
[Peer]
|
[Peer]
|
||||||
PublicKey = {{ user.pubkey }}
|
PublicKey = {{ user.pubkey }}
|
||||||
AllowedIPs = {{ wireguard.net.v4.addr }}.{{ user.bit }}/{{ wireguard.net.v4.range.clnt }}, {{ wireguard.net.v6.addr}}:{{ user.bit }}/{{ wireguard.net.v6.range.clnt }}
|
AllowedIPs = {{ services.wireguard.net.v4.addr }}.{{ user.bit }}/{{ wireguard.net.v4.range.clnt }}, {{ wireguard.net.v6.addr}}:{{ user.bit }}/{{ wireguard.net.v6.range.clnt }}
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
|
Reference in New Issue