
We’ll call our interface wg0, so the config file will be /etc/wireguard/wg0.conf.įirst, let’s assign IP addresses from a private subnet: The configuration of WireGuard lives in /etc/wireguard.


You should choose the location that is the closest to you. I recommend the cheap $3.50 VM from Vultr. On Debian, you need to install it from the unstable repository and on Ubuntu from a PPA. I’m usually using Debian 9 or Ubuntu 18.04 on my servers. WireGuard can run nearly anywhere, all the installation notes are on the website. On other platforms such as macOS, non-rooted Android and FreeBSD, the module is replaced by a userspace Go implementation.įYI, it is planned for the WireGuard module to be integrated in the Linux kernel itself. WireGuard comes in two parts: the tools, which will allow us to manage the peers and interfaces, and the Linux kernel module.
#IVPN PUBLIC IP ADDRESS NOT WORKING HOW TO#
We will see how to add multiple clients at the end of the tutorial.

The trick to make use of the VPN to forward all of the client’s traffic trough the server is to: Connecting both in a private subnet is easy. The setup is pretty simple : we have 2 peers, one server and one client. In this post, I will explain how I use WireGuard on my laptop and phone, which forward all their traffic to the server while having a dual-stack connectivity. I made a wireguard-install script to automate the installation!
