Difference between revisions of "Wireguard"
(→Plesk) |
(→Plesk) |
||
| Line 2: | Line 2: | ||
=== prerequisite === | === prerequisite === | ||
==== Plesk ==== | ==== Plesk ==== | ||
| − | * watch out for plesk-default-firewall-rules! | + | * watch out for plesk-default-firewall-rules! <code>System policy for traffic forwarding = Deny forwarding of all other traffic</code> |
| − | + | ** change to <code>Allow ...</code> | |
| − | |||
* add firewall-rule <code>Allow incoming from all on port 51820/udp</code> | * add firewall-rule <code>Allow incoming from all on port 51820/udp</code> | ||
* add Plesk Docker Extension | * add Plesk Docker Extension | ||
Revision as of 08:22, 21 October 2023
plesk, docker, wireguard
prerequisite
Plesk
- watch out for plesk-default-firewall-rules!
System policy for traffic forwarding = Deny forwarding of all other traffic- change to
Allow ...
- change to
- add firewall-rule
Allow incoming from all on port 51820/udp - add Plesk Docker Extension
shell
apt install docker-compose- edit /etc/sysctl.conf
net.ipv4.ip_forward=1- reload
sysctl -p
- reload
- check kernel module
modprobe wireguard