mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-03-29 04:23:34 +01:00
2.5 KiB
2.5 KiB
Native Wireguard Client
Description
This role manages WireGuard on a client system. It sets up essential services and scripts to configure and optimize WireGuard connectivity. Additionally, it provides a link to an Administration document for creating client keys.
Overview
Optimized for client configurations, this role:
- Deploys a systemd service (
set-mtu.cymais.service
) and its associated script to set the MTU on specified network interfaces. - Uses a Jinja2 template to generate the
set-mtu.sh
script. - Ensures that the MTU is configured correctly before starting WireGuard with wg-quick.
Purpose
The primary purpose of this role is to configure WireGuard on a client by setting appropriate MTU values on network interfaces. This ensures a stable and optimized VPN connection.
Features
- MTU Configuration: Deploys a template-based script to set the MTU on all defined internet interfaces.
- Systemd Service Integration: Creates and manages a systemd service to execute the MTU configuration script.
- Administration Support: For client key creation and further setup, please refer to the Administration file.
- Modular Design: Easily integrates with other WireGuard roles or network configuration roles.
📚 Other Resources
- WireGuard Documentation
- ArchWiki: WireGuard
- WireGuard on Raspbian
- Subnetting Basics
- WireGuard Permissions Issue Discussion
- SSH Issues with WireGuard
- UFW and SSH via WireGuard
- OpenWrt Forum Discussion on WireGuard
- WireGuard Connection Dies on Ubuntu
- SSH Fails with WireGuard IP
- WireGuard NAT and Firewall Issues