forked from colin/nix-files
netconf: remove old wg-quick config
This commit is contained in:
parent
8d0deffd61
commit
ef76063cd3
|
@ -11,28 +11,6 @@
|
|||
|
||||
# OVPN CONFIG:
|
||||
# DOCS: https://nixos.wiki/wiki/WireGuard
|
||||
# note: this WORKS. i believe it routes ALL (most??) outbound traffic over wg (but still accepts inbound on eth0??)
|
||||
# TODO: add wg0 as an interface, and selectively route applications over it.
|
||||
# try: https://mth.st/blog/nixos-wireguard-netns/
|
||||
# networking.wg-quick.interfaces.wg0 = {
|
||||
# privateKeyFile = "/etc/nixos/wireguard.private";
|
||||
# address = [
|
||||
# "185.157.162.190/32"
|
||||
# ];
|
||||
# dns = [
|
||||
# "46.227.67.134"
|
||||
# "192.165.9.158"
|
||||
# ];
|
||||
# peers = [
|
||||
# {
|
||||
# publicKey = "Qno+hILmJ8TZ6/PpOOhtspmncyILY2phiTBFaER9IFE=";
|
||||
# endpoint = "vpn29.prd.amsterdam.ovpn.com:9930";
|
||||
# allowedIPs = [ "0.0.0.0/0" ];
|
||||
# # nixOS says this is important for keeping NATs active
|
||||
# persistentKeepalive = 25;
|
||||
# }
|
||||
# ];
|
||||
# };
|
||||
# note: without the namespace, you'll need to add a specific route through eth0 for the peer (185.157.162.7/32)
|
||||
networking.wireguard.enable = true;
|
||||
networking.wireguard.interfaces.wg0 = {
|
||||
|
|
Loading…
Reference in New Issue
Block a user