mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-26 21:45:20 +02:00
Replaced all hardcoded service name concatenations with the new get_service_name filter. This ensures consistency, proper lowercase formatting, and correct handling of '@' suffixed units. Added unittests for the filter (normal, custom suffix, '@'-units, and lowercase normalization). Context: see ChatGPT discussion https://chatgpt.com/share/68a38beb-b9bc-800f-b7ed-cdd2b64b2604
2.4 KiB
2.4 KiB
Wireguard Client
Description
This role manages WireGuard on a client system. It sets up essential services and scripts to configure and optimize WireGuard connectivity.
Overview
Optimized for client configurations, this role:
- Deploys a systemd service and its associated script to set the MTU on specified network interfaces.
- Uses a Jinja2 template to generate the
set-mtu.sh
script. - Ensures that the MTU is configured correctly before starting WireGuard with wg-quick.
Purpose
The primary purpose of this role is to configure WireGuard on a client by setting appropriate MTU values on network interfaces. This ensures a stable and optimized VPN connection.
Features
- MTU Configuration: Deploys a template-based script to set the MTU on all defined internet interfaces.
- Systemd Service Integration: Creates and manages a systemd service to execute the MTU configuration script.
- Administration Support: For client key creation and further setup, please refer to the Administration file.
- Modular Design: Easily integrates with other WireGuard roles or network configuration roles.
Other Resources
- WireGuard Documentation
- ArchWiki: WireGuard
- WireGuard on Raspbian
- Subnetting Basics
- WireGuard Permissions Issue Discussion
- SSH Issues with WireGuard
- UFW and SSH via WireGuard
- OpenWrt Forum Discussion on WireGuard
- WireGuard Connection Dies on Ubuntu
- SSH Fails with WireGuard IP
- WireGuard NAT and Firewall Issues