summaryrefslogtreecommitdiffstats
path: root/content/posts/openbsd-wireguard-vpn-gateway
diff options
context:
space:
mode:
Diffstat (limited to 'content/posts/openbsd-wireguard-vpn-gateway')
-rw-r--r--content/posts/openbsd-wireguard-vpn-gateway/index.org6
1 files changed, 3 insertions, 3 deletions
diff --git a/content/posts/openbsd-wireguard-vpn-gateway/index.org b/content/posts/openbsd-wireguard-vpn-gateway/index.org
index cf41034..0496387 100644
--- a/content/posts/openbsd-wireguard-vpn-gateway/index.org
+++ b/content/posts/openbsd-wireguard-vpn-gateway/index.org
@@ -89,13 +89,13 @@ wgpeer PUBLICKEY wgaip 0.0.0.0/0 wgaip ::0/0 wgendpoint ENDPOINT 51820
!route -T 1 add -inet6 default YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY
#+end_src
+We can bring up the interface using the command =sh /etc/netstart wg0=.
+
Now that our interfaces are setup, we need to create the firewall
rules that will take care of the routing and NAT. We use a couple
macros here (=$ext_if= and =$vpn_if=) to make it easy to change the
interface names if we ever have to.
-We can bring up the interface using the command =sh /etc/netstart wg0=.
-
#+CAPTION: =/etc/pf.conf=
#+begin_src conf
set skip on lo
@@ -131,7 +131,7 @@ Let's break down this file line by line.
- =vpn_if = "wg0"= Create a macro for the VPN interface.
- =pass in quick on $ext_if proto tcp from $ext_if:network to self
port 22= Here we allow any traffic directly addressing our server on
- TDP port 22 to pass in without any further rule evaluations. This
+ TCP port 22 to pass in without any further rule evaluations. This
lets us SSH into our server without the packets being put into the
VPN routing table.
- =pass out on $ext_if from self= This lets us connect to the internet