<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Wireguard-cheat-sheet</id>
	<title>Wireguard-cheat-sheet - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Wireguard-cheat-sheet"/>
	<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Wireguard-cheat-sheet&amp;action=history"/>
	<updated>2026-05-15T04:12:02Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Xinux Wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Wireguard-cheat-sheet&amp;diff=61424&amp;oldid=prev</id>
		<title>Thomas.will: Die Seite wurde neu angelegt: „= WireGuard Cheat Sheet =  == Installation == *apt install wireguard  == Schlüsselpaar erzeugen == *mkdir -p /etc/wireguard *cd /etc/wireguard *wg genkey | te…“</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Wireguard-cheat-sheet&amp;diff=61424&amp;oldid=prev"/>
		<updated>2025-04-12T11:57:03Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „= WireGuard Cheat Sheet =  == Installation == *apt install wireguard  == Schlüsselpaar erzeugen == *mkdir -p /etc/wireguard *cd /etc/wireguard *wg genkey | te…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= WireGuard Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
*apt install wireguard&lt;br /&gt;
&lt;br /&gt;
== Schlüsselpaar erzeugen ==&lt;br /&gt;
*mkdir -p /etc/wireguard&lt;br /&gt;
*cd /etc/wireguard&lt;br /&gt;
*wg genkey | tee privatekey | wg pubkey &amp;gt; publickey&lt;br /&gt;
&lt;br /&gt;
== Server-Konfiguration ==&lt;br /&gt;
*/etc/wireguard/wg0.conf:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Interface]&lt;br /&gt;
PrivateKey = SERVER-PRIVATE-KEY&lt;br /&gt;
Address = 10.0.0.1/24&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
&lt;br /&gt;
[Peer]&lt;br /&gt;
PublicKey = CLIENT-PUBLIC-KEY&lt;br /&gt;
AllowedIPs = 10.0.0.2/32&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Client-Konfiguration ==&lt;br /&gt;
*/etc/wireguard/wg0.conf:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Interface]&lt;br /&gt;
PrivateKey = CLIENT-PRIVATE-KEY&lt;br /&gt;
Address = 10.0.0.2/24&lt;br /&gt;
&lt;br /&gt;
[Peer]&lt;br /&gt;
PublicKey = SERVER-PUBLIC-KEY&lt;br /&gt;
Endpoint = vpn.example.com:51820&lt;br /&gt;
AllowedIPs = 0.0.0.0/0, ::/0&lt;br /&gt;
PersistentKeepalive = 25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Verbindung starten und stoppen ==&lt;br /&gt;
*wg-quick up wg0&lt;br /&gt;
*wg-quick down wg0&lt;br /&gt;
&lt;br /&gt;
== Status anzeigen ==&lt;br /&gt;
*wg show&lt;br /&gt;
&lt;br /&gt;
== Autostart aktivieren/deaktivieren ==&lt;br /&gt;
*systemctl enable wg-quick@wg0&lt;br /&gt;
*systemctl disable wg-quick@wg0&lt;br /&gt;
&lt;br /&gt;
== IPv4-Forwarding aktivieren ==&lt;br /&gt;
*echo net.ipv4.ip_forward=1 &amp;gt;&amp;gt; /etc/sysctl.conf&lt;br /&gt;
*sysctl -p&lt;br /&gt;
&lt;br /&gt;
== Beispiel nftables-Konfiguration ==&lt;br /&gt;
*/etc/nftables.conf:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
table inet filter {&lt;br /&gt;
 chain input {&lt;br /&gt;
  type filter hook input priority 0;&lt;br /&gt;
  policy drop;&lt;br /&gt;
  iif &amp;quot;wg0&amp;quot; accept&lt;br /&gt;
  ct state established,related accept&lt;br /&gt;
  tcp dport 22 accept&lt;br /&gt;
  udp dport 51820 accept&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
 chain forward {&lt;br /&gt;
  type filter hook forward priority 0;&lt;br /&gt;
  policy drop;&lt;br /&gt;
  iif &amp;quot;wg0&amp;quot; accept&lt;br /&gt;
  oif &amp;quot;eth0&amp;quot; accept&lt;br /&gt;
  ct state established,related accept&lt;br /&gt;
 }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NAT mit iptables ==&lt;br /&gt;
*iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE&lt;br /&gt;
&lt;br /&gt;
== NAT mit nftables ==&lt;br /&gt;
*/etc/nftables.conf (Zusatz für NAT):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
table ip nat {&lt;br /&gt;
 chain postrouting {&lt;br /&gt;
  type nat hook postrouting priority 100;&lt;br /&gt;
  oifname &amp;quot;eth0&amp;quot; masquerade&lt;br /&gt;
 }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Thomas.will</name></author>
	</entry>
</feed>