服务器
[Interface]
PrivateKey = eNUwG70LuGZAe85wnLebUDVffeg/BfLmEA+anZXuS1A= #本机私钥
Address = 192.168.200.1/24 #本机虚拟局域网IP
DNS = 8.8.8.8 #本机虚拟局域网DNS
MTU = 1200 #默认1420,修改成1200是因为udp2raw伪装成TCP要求
ListenPort = 51820 # 本机监听端口
PostUp = iptables -A FORWARD -i wg0 -j ACCEPT && iptables -A FORWARD -o wg0 -j ACCEPT && iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT && iptables -D FORWARD -o wg0 -j ACCEPT && iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
[Peer]
PublicKey = 2oQBDyxcghbvYxHcQrYtRwpwuy9DEe9mBgYmsQt1rnY= #客户端公钥
AllowedIPs = 192.168.200.0/24 #允许客户端IP范围
PersistentKeepalive = 25 #隧道心跳包间隔
客户端
[Interface]
PrivateKey = AOuT6mG+H9htHOHxmvGitUY1Lk6l4r8VSziVjWBMVnU= #本机私钥
Address = 192.168.200.2/24 #本机虚拟局域网IP
DNS = 8.8.8.8 #本机虚拟局域网DNS
MTU = 1200 #默认1420,修改成1200是因为udp2raw伪装成TCP要求
Table = off
FwMark = off
[Peer]
PublicKey = ca0JHAru5YNh5zDirHyoott9INLN+2jayTbxDBRXzHI= #客户端公钥
AllowedIPs = 192.168.200.0/24 #允许客户端IP范围
PersistentKeepalive = 25 #隧道心跳包间隔
Endpoint = 127.0.0.1:3333
版权属于:疯狂的猿猴
本文链接:https://592850.com/archives/1413.html
本站文章采用 知识共享署名4.0 国际许可协议 进行许可,请在转载时注明出处及本声明!