diff --git a/posts/wireguard.md b/posts/wireguard.md index c4d0df6..60a44c2 100644 --- a/posts/wireguard.md +++ b/posts/wireguard.md @@ -197,15 +197,7 @@ to load the new configuration. If your VPN server is on the public internet, be sure to have sane firewall rules before doing this. -> Note: If you use [UFW](https://wiki.archlinux.org/title/Uncomplicated_Firewall) as a firewall like me, you'll also [need to set a rule](https://dietpi.com/forum/t/wireguard-no-handshake-established/15979) to let VPN traffic in. -> Without this, all the `iptables` rules do nothing and your forwarded packets will get blocked. -> Replace the subnet with your VPN subnet: -> -> ``` -> # ufw allow in from 10.0.0.0/24 to any -> ``` - -> Another UFW quirk is that it has its own `sysctl.conf`, which lives at `/etc/ufw/sysctl.conf`. +> Note: If you use [UFW](https://wiki.archlinux.org/title/Uncomplicated_Firewall) as a firewall like me, note that it has its own `sysctl.conf`, which lives at `/etc/ufw/sysctl.conf`. > This will override the regular `sysctl` if you follow the instructions above. > To prevent it from erasing your changes, uncomment the relevant line: >