Difference between revisions of "Wireguard"
(→Plesk) |
(→Plesk) |
||
Line 2: | Line 2: | ||
=== prerequisite === | === prerequisite === | ||
==== Plesk ==== | ==== Plesk ==== | ||
− | * watch out for plesk-default-firewall-rules! | + | * watch out for plesk-default-firewall-rules! <code>System policy for traffic forwarding = Deny forwarding of all other traffic</code> |
− | + | ** change to <code>Allow ...</code> | |
− | |||
* add firewall-rule <code>Allow incoming from all on port 51820/udp</code> | * add firewall-rule <code>Allow incoming from all on port 51820/udp</code> | ||
* add Plesk Docker Extension | * add Plesk Docker Extension |
Revision as of 08:22, 21 October 2023
plesk, docker, wireguard
prerequisite
Plesk
- watch out for plesk-default-firewall-rules!
System policy for traffic forwarding = Deny forwarding of all other traffic
- change to
Allow ...
- change to
- add firewall-rule
Allow incoming from all on port 51820/udp
- add Plesk Docker Extension
shell
apt install docker-compose
- edit /etc/sysctl.conf
net.ipv4.ip_forward=1
- reload
sysctl -p
- reload
- check kernel module
modprobe wireguard