Skip to content

Commit b2b8c5e

Browse files
defguard-communitygitbook-bot
authored andcommitted
GITBOOK-382: change request with no subject merged in GitBook
1 parent dd11307 commit b2b8c5e

1 file changed

Lines changed: 6 additions & 2 deletions

File tree

  • tutorials/step-by-step-setting-up-a-vpn-server

tutorials/step-by-step-setting-up-a-vpn-server/README.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ We assume you have:
2020
* defguard enrollment service that will enable to easy configure Desktop Clients just with one token is: _enroll.defguard.net_ (this subdomain also points to _185.33.37.51_)
2121
* server is Debian/Ubuntu-based
2222
* have installed the [official Docker Engine](https://docs.docker.com/engine/install/debian/#install-using-the-repository) and [docker-compose](https://docs.docker.com/compose/install/standalone/#on-linux) (from our experience it's better to use the official Docker Engine then docker shipped with distro packages - but this should also work with distro packages) and have
23-
* VPN network will be: 10.22.33.0/24 - but you can assign [any private network address](https://en.wikipedia.org/wiki/Private\_network) and use it in this tutorial - we will name it _Example_
23+
* VPN network will be: 10.22.33.0/24 - but you can assign [any private network address](https://en.wikipedia.org/wiki/Private_network) and use it in this tutorial - we will name it _Example_
2424
* If you have a **firewall**, we assume you have **open ports** (if not below we will show you how to enable and secure your server):
2525
* 443 - in order to expose both defguard & enrollemnt service - but also to automatically issue for these domains SSL Certificates (which the installer script does)
2626
* 50555 - on this port the WireGuard VPN server will be listning for incoming connections from clients
@@ -164,7 +164,11 @@ net.ipv4.ip_forward=1
164164
root@server:~# sysctl -p
165165
```
166166

167-
Now we need to configure firewall [NAT](https://en.wikipedia.org/wiki/Network\_address\_translation), so that the server will "_translate/masq_" VPN traffic behind its public IP. In order to do that, we need to add rules to MASQUERADE VPN network behind the public interface of the sever.
167+
Now we need to configure firewall [NAT](https://en.wikipedia.org/wiki/Network_address_translation), so that the server will "_translate/masq_" VPN traffic behind its public IP. In order to do that, we need to add rules to MASQUERADE VPN network behind the public interface of the sever.
168+
169+
{% hint style="info" %}
170+
From version 1.3.0, gateway can automatically apply masquerade to traffic on all interfaces without the need for manual configuration. Refer to [#masquerade](../../enterprise/all-enteprise-features/access-control-list/#masquerade "mention") for details. If you use this feature, you can skip the following manual masquerade setup step.
171+
{% endhint %}
168172

169173
We know that VPN network is 10.22.33.0/24 now we need to be sure what interface has the public IP (in our case: 185.33.37.51) - let's figure it out with this command:
170174

0 commit comments

Comments
 (0)