Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Wireguard Client , allow connection on x port #74

Open
AnonymousWebHacker opened this issue Nov 28, 2021 · 4 comments
Open

Wireguard Client , allow connection on x port #74

AnonymousWebHacker opened this issue Nov 28, 2021 · 4 comments

Comments

@AnonymousWebHacker
Copy link

Can read more there
hwdsl2/setup-ipsec-vpn#1059

@pirate
Copy link
Owner

pirate commented Dec 3, 2021

not sure what you're asking for... Isn't this just https://github.com/pirate/wireguard-docs#ListenPort ?

@AnonymousWebHacker
Copy link
Author

I have a VPS with Ipsec (L2PT Server) and client wireguard, to connect to an external wireguard server.

So, I can connect perfectly to the L2PT, but once I start the wireguard client, the L2PT disconnects, that is, it expels me, if I turn off the wireguard client, I can connect again without problems

@pirate
Copy link
Owner

pirate commented Dec 5, 2021

You tried using a different port for WireGuard?

@AnonymousWebHacker
Copy link
Author

This is an example of a client wireguar configuration, there is nothing related to ports. Anyway, L2PT uses ports 500 and 4500

[Interface]
PrivateKey = <redacted>
Address = 10.66.66.6/32,fd42:42:42::6/128
DNS = 1.1.1.1,1.0.0.1

# Configuration allow ssh ip vps
PostUp = ip rule add table 200 from <ip-vps>
PostUp = ip route add table 200 default via <gw-vps>
PreDown = ip rule delete table 200 from <ip-vps>
PreDown = ip route delete table 200 default via  <gw-vps>

[Peer]
PublicKey = <redacted>
PresharedKey = <redacted>
Endpoint = ipserver-external:443
AllowedIPs = 0.0.0.0/0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants