nixos-config/nixos/machines/chungus/network-wireguard.nix

31 lines
928 B
Nix
Raw Normal View History

2023-05-12 11:17:58 +02:00
{ pkgs, config, ... }:
{
networking.firewall.allowedUDPPorts = [ 51820 ];
clanCore.facts.services.wireguard = factsGenerator.wireguard { name = "wg0"; };
2023-05-12 11:17:58 +02:00
# Enable WireGuard
networking.wg-quick.interfaces = {
# Hub and Spoke Setup
# https://www.procustodibus.com/blog/2020/11/wireguard-hub-and-spoke-config/
wg0 = {
address = [ "10.100.0.2/32" ];
listenPort = 51820; # to match firewall allowedUDPPorts (without this wg uses random port numbers)
privateKeyFile = config.clanCore.facts.services.wireguard.secret."wireguard.wg0.key".path;
2023-05-12 11:17:58 +02:00
mtu = 1280;
# server
peers = [
{
2024-04-07 17:58:36 +02:00
# orbi
2023-05-12 11:17:58 +02:00
publicKey = "uWR93xJe5oEbX3DsAYpOS9CuSg1VmXEQxJzdlJpe3DU=";
allowedIPs = [ "10.100.0.1/24" ];
#endpoint = "ingolf-wagner.de:51820";
endpoint = "95.216.66.212:51820";
2023-05-12 11:17:58 +02:00
persistentKeepalive = 25;
}
];
};
};
}