mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-27 05:55:15 +02:00
- Unified service templates into generic systemctl templates - Introduced reusable filter plugins for script path handling - Updated path variables and service/timer definitions - Migrated roles (backup, cleanup, repair, etc.) to use systemctl role - Added sys-daemon role for core systemd cleanup - Simplified timer handling via sys-timer role Note: This is a large refactor and some errors may still exist. Further testing and adjustments will be needed.
WireGuard Client behind NAT
Description
This role adapts iptables rules to enable proper connectivity for a WireGuard client running behind a NAT or firewall. It ensures that traffic is forwarded correctly by applying necessary masquerading rules.
Overview
Optimized for environments with network address translation (NAT), this role:
- Executes shell commands to modify iptables rules.
- Allows traffic from the WireGuard client interface (e.g.
wg0-client
) and sets up NAT masquerading on the external interface (e.g.eth0
). - Works as an extension to the native WireGuard client role.
Purpose
The primary purpose of this role is to enable proper routing and connectivity for a WireGuard client situated behind a firewall or NAT device. By adapting iptables rules, it ensures that the client can communicate effectively with external networks.
Features
- iptables Rule Adaptation: Modifies iptables to allow forwarding and NAT masquerading for the WireGuard client.
- NAT Support: Configures the external interface for proper masquerading.
- Role Integration: Depends on the svc-net-wireguard-plain role to ensure that WireGuard is properly configured before applying firewall rules.