posts/wireguard: remove extraneous advice
This commit is contained in:
parent
0d139a9117
commit
7af2534b4c
@ -197,15 +197,7 @@ to load the new configuration.
|
|||||||
If your VPN server is on the public internet,
|
If your VPN server is on the public internet,
|
||||||
be sure to have sane firewall rules before doing this.
|
be sure to have sane firewall rules before doing this.
|
||||||
|
|
||||||
> Note: If you use [UFW](https://wiki.archlinux.org/title/Uncomplicated_Firewall) as a firewall like me, you'll also [need to set a rule](https://dietpi.com/forum/t/wireguard-no-handshake-established/15979) to let VPN traffic in.
|
> Note: If you use [UFW](https://wiki.archlinux.org/title/Uncomplicated_Firewall) as a firewall like me, note that it has its own `sysctl.conf`, which lives at `/etc/ufw/sysctl.conf`.
|
||||||
> Without this, all the `iptables` rules do nothing and your forwarded packets will get blocked.
|
|
||||||
> Replace the subnet with your VPN subnet:
|
|
||||||
>
|
|
||||||
> ```
|
|
||||||
> # ufw allow in from 10.0.0.0/24 to any
|
|
||||||
> ```
|
|
||||||
|
|
||||||
> Another UFW quirk is that it has its own `sysctl.conf`, which lives at `/etc/ufw/sysctl.conf`.
|
|
||||||
> This will override the regular `sysctl` if you follow the instructions above.
|
> This will override the regular `sysctl` if you follow the instructions above.
|
||||||
> To prevent it from erasing your changes, uncomment the relevant line:
|
> To prevent it from erasing your changes, uncomment the relevant line:
|
||||||
>
|
>
|
||||||
|
Loading…
Reference in New Issue
Block a user