Update Wireguard with allowed destination IPs
This commit is contained in:
parent
8745dba834
commit
b0e45fe0f7
@ -8,11 +8,12 @@ read -e -p "Enter lan NIC: " -i $(ip route | grep default | sed -e 's/^.*dev.//'
|
||||
read -e -p "Enter VPN subnet: " -i "192.168.200" VPN_SUBNET
|
||||
read -e -p "Enter LAN subnet: " -i "192.168.0" LAN_SUBNET
|
||||
read -e -p "Enter VPN public hostname: " -i "home.myspace.nu" VPN_PUBLIC_HOST
|
||||
read -e -p "Allowed destination LAN IPs (empty for all): " -i "${LAN_SUBNET}.1,${LAN_SUBNET}.2" ALLOWED_HOST_IPs
|
||||
|
||||
if [ $(dpkg-query -W -f='${Status}' wireguard 2>/dev/null | grep -c "ok installed") -eq 0 ];
|
||||
then
|
||||
echo "Installing Wireguard"
|
||||
apt install wireguard
|
||||
echo "Installing Wireguard..."
|
||||
apt install wireguard -y
|
||||
fi
|
||||
|
||||
mkdir -m 0700 /etc/wireguard/ > /dev/null 2>&1
|
||||
@ -33,22 +34,36 @@ if ! grep -q "net.ipv4.ip_forward" "/etc/sysctl.d/10-wireguard.conf"; then
|
||||
sysctl -p /etc/sysctl.d/10-wireguard.conf
|
||||
fi
|
||||
|
||||
if [ -z "$ALLOWED_HOST_IPs" ]
|
||||
then
|
||||
POSTUP="$POSTUP""PostUp = iptables -A FORWARD -i %i -d $LAN_SUBNET.0/24 -j ACCEPT
|
||||
"
|
||||
POSTDOWN="$POSTDOWN""PostDown = iptables -D FORWARD -i %i -d $LAN_SUBNET.0/24 -j ACCEPT
|
||||
"
|
||||
else
|
||||
for i in ${ALLOWED_HOST_IPs//,/ }
|
||||
do
|
||||
POSTUP="$POSTUP""PostUp = iptables -A FORWARD -i %i -d $i/32 -j ACCEPT
|
||||
"
|
||||
POSTDOWN="$POSTDOWN""PostDown = iptables -D FORWARD -i %i -d $i/32 -j ACCEPT
|
||||
"
|
||||
done
|
||||
fi
|
||||
|
||||
sudo tee /etc/wireguard/wg0.conf.base > /dev/null <<EOL
|
||||
[Interface]
|
||||
Address = $VPN_SUBNET.1/24
|
||||
ListenPort = 51820
|
||||
PrivateKey = ${SERVER_PRIVATEKEY}
|
||||
|
||||
PostUp = iptables -A FORWARD -i %i -d 192.168.0.1/32 -j ACCEPT
|
||||
PostUp = iptables -A FORWARD -i %i -d 192.168.0.3/32 -j ACCEPT
|
||||
PostUp = iptables -A FORWARD -i %i -d 192.168.200.0/24 -j ACCEPT
|
||||
${POSTUP}
|
||||
PostUp = iptables -A FORWARD -i %i -d $VPN_SUBNET.0/24 -j ACCEPT
|
||||
PostUp = iptables -A FORWARD -i %i -d 0.0.0.0/0 -j DROP
|
||||
PostUp = iptables -A FORWARD -o %i -j ACCEPT
|
||||
PostUp = iptables -t nat -A POSTROUTING -o ${NIC_NAME,,} -j MASQUERADE
|
||||
|
||||
PostDown = iptables -D FORWARD -i %i -d 192.168.0.1/32 -j ACCEPT
|
||||
PostDown = iptables -D FORWARD -i %i -d 192.168.0.3/32 -j ACCEPT
|
||||
PostDown = iptables -D FORWARD -i %i -d 192.168.200.0/24 -j ACCEPT
|
||||
${POSTDOWN}
|
||||
PostDown = iptables -D FORWARD -i %i -d $VPN_SUBNET.0/24 -j ACCEPT
|
||||
PostDown = iptables -D FORWARD -i %i -d 0.0.0.0/0 -j DROP
|
||||
PostDown = iptables -D FORWARD -o %i -j ACCEPT
|
||||
PostDown = iptables -t nat -D POSTROUTING -o ${NIC_NAME,,} -j MASQUERADE
|
||||
@ -56,7 +71,7 @@ PostDown = iptables -t nat -D POSTROUTING -o ${NIC_NAME,,} -j MASQUERADE
|
||||
# [Peer]
|
||||
# Client 1
|
||||
# PublicKey = ...
|
||||
# AllowedIPs = 192.168.200.2/32
|
||||
# AllowedIPs = $VPN_SUBNET.2/32
|
||||
|
||||
EOL
|
||||
cat /etc/wireguard/wg0.conf.base /etc/wireguard/wg0.conf.clients > /etc/wireguard/wg0.conf
|
||||
|
Loading…
x
Reference in New Issue
Block a user