Skip to content

izaxs/wireguard-note

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 

Repository files navigation

WireGuard Note

Host your own VPN elegantly with WireGuard based VPN

The Tailscale Way: 2023 Update

The days of laborious manual VPN setup have become a thing of the past with the introduction of Tailscale. This tool significantly simplifies the process of establishing a VPN with exit nodes.

Tailscale Signup

Follow Tailscale's official guide to signup

Setup SSH on Server

Suggestion: Before working on WireGuard, setup SSH on client with alias, so you can easily manage the server later

SSH server guide

Following commands assume the server OS is Debian Bullseye

Setup APT Repo

curl -fsSL https://pkgs.tailscale.com/stable/debian/bullseye.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null
curl -fsSL https://pkgs.tailscale.com/stable/debian/bullseye.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list

Install Tailscale

sudo apt-get update
sudo apt-get install tailscale

Setup Linux Packet Forwarding Rule

echo 'net.ipv4.ip_forward = 1' | sudo tee -a /etc/sysctl.d/99-tailscale.conf
echo 'net.ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.d/99-tailscale.conf
sudo sysctl -p /etc/sysctl.d/99-tailscale.conf

Run Tailscale

sudo tailscale up --advertise-exit-node

An auth link will show up after this command, paste it into your browser to finish the authentication

Manage Joined Device

Use Tailscale Admin Console to manage your network

Reference:

Setting up Tailscale on Linux

Exit Nodes

Prefer a frugal WireGuard setup rather than relying on Tailscale?

Follow the pure WireGuard setup guide: WIREGUARD.md