mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-26 21:45:20 +02:00
- Unified service templates into generic systemctl templates - Introduced reusable filter plugins for script path handling - Updated path variables and service/timer definitions - Migrated roles (backup, cleanup, repair, etc.) to use systemctl role - Added sys-daemon role for core systemd cleanup - Simplified timer handling via sys-timer role Note: This is a large refactor and some errors may still exist. Further testing and adjustments will be needed.
1.4 KiB
1.4 KiB
WireGuard Client behind NAT
Description
This role adapts iptables rules to enable proper connectivity for a WireGuard client running behind a NAT or firewall. It ensures that traffic is forwarded correctly by applying necessary masquerading rules.
Overview
Optimized for environments with network address translation (NAT), this role:
- Executes shell commands to modify iptables rules.
- Allows traffic from the WireGuard client interface (e.g.
wg0-client
) and sets up NAT masquerading on the external interface (e.g.eth0
). - Works as an extension to the native WireGuard client role.
Purpose
The primary purpose of this role is to enable proper routing and connectivity for a WireGuard client situated behind a firewall or NAT device. By adapting iptables rules, it ensures that the client can communicate effectively with external networks.
Features
- iptables Rule Adaptation: Modifies iptables to allow forwarding and NAT masquerading for the WireGuard client.
- NAT Support: Configures the external interface for proper masquerading.
- Role Integration: Depends on the svc-net-wireguard-plain role to ensure that WireGuard is properly configured before applying firewall rules.