..
2024-01-18 11:11:34 +01:00
2023-12-18 23:20:30 +01:00
2024-01-22 15:27:26 +01:00

Configuration de ferm

Ferm

Modifier l'execution d'iptables [plus d'info ici#!/bin/bash set -u set -e

Version Site to Site

AddressAwg=10.0.0.1/32 # Adresse VPN Wireguard cote A EndpointA=192.168.0.51 # Adresse extremite A PortA=51820 # Port ecoute extremite A NetworkA=192.168.1.0/24 # reseau cote A NetworkC=192.168.200.0/24 #reseau cote A NetworkD=172.16.0.0/24 #reseau cote A

AddressBwg=10.0.0.2/32 # Adresse VPN Wireguard cote B EndpointB=192.168.0.52 # Adresse extremite B PortB=51820 # Port ecoute extremite B NetworkB=172.16.128.0/24 # reseau cote B

umask 077 wg genkey > endpoint-a.key wg pubkey < endpoint-a.key > endpoint-a.pub

wg genkey > endpoint-b.key wg pubkey < endpoint-b.key > endpoint-b.pub

PKA=$(cat endpoint-a.key) pKA=$(cat endpoint-a.pub) PKB=$(cat endpoint-b.key) pKB=$(cat endpoint-b.pub)

cat < wg0-a.conf

local settings for Endpoint A

[Interface] PrivateKey = $PKA Address = $AddressAwg ListenPort = $PortA

IP forwarding

PreUp = sysctl -w net.ipv4.ip_forward=1

remote settings for Endpoint B

[Peer] PublicKey = $pKB Endpoint = ${EndpointB}:$PortB AllowedIPs = $AddressBwg, $NetworkB

FINI

cat < wg0-b.conf

local settings for Endpoint B

[Interface] PrivateKey = $PKB Address = $AddressBwg ListenPort = $PortB

IP forwarding

PreUp = sysctl -w net.ipv4.ip_forward=1

remote settings for Endpoint A

[Peer] PublicKey = $pKA Endpoint = ${EndpointA}:$PortA AllowedIPs = $AddressAwg, $NetworkA, $NetworkC, $NetworkD

FINI

echo "wg0-a.conf et wg0-b.conf sont generes ..." echo "copier wg0-b.conf sur la machine b et renommer les fichiers de configuration ..."](https://wiki.debian.org/iptables)

update-alternatives --set iptables /usr/sbin/iptables-legacy

Pour tester utiliser Nmap

r-vp1

sudo nmap -p51820  192.168.0.51

r-vp2

sudo nmap -p51820  192.168.0.52

Sortie :

`PORT      STATE    SERVICE
51820/tcp filtered unknown`

Faire des ping!