add additional wireguard interface without pihole

install traceroute and units
This commit is contained in:
Pim Kunis 2024-01-13 14:00:17 +01:00
parent 9e639175fd
commit adf2f1e7cb
2 changed files with 28 additions and 10 deletions

View file

@ -36,6 +36,8 @@
silicon
dbeaver
wireshark
traceroute
units
];
file.k3s-pim-privkey = {

View file

@ -121,17 +121,33 @@
networking = {
hostName = "x260";
wg-quick.interfaces.home = {
wg-quick.interfaces = {
home = {
privateKeyFile = config.age.secrets.wg-quick-home-privkey.path;
address = [ "10.225.191.4/24" ];
dns = [ "192.168.30.8" ];
autostart = false;
peers = [{
presharedKeyFile = config.age.secrets.wg-quick-home-preshared-key.path;
endpoint = "wg.geokunis2.nl:51820";
endpoint = "wg4.geokunis2.nl:51820";
publicKey = "fa3mQ7ximJbH7cu2ZbWidto5xBGxEEfWvCCiUDk00Hg=";
allowedIPs = [ "0.0.0.0/0" "::0/0" ];
}];
};
home-no-pihole = {
privateKeyFile = config.age.secrets.wg-quick-home-privkey.path;
address = [ "10.225.191.4/24" ];
dns = [ "192.168.30.1" ];
autostart = false;
peers = [{
presharedKeyFile = config.age.secrets.wg-quick-home-preshared-key.path;
endpoint = "wg4.geokunis2.nl:51820";
publicKey = "fa3mQ7ximJbH7cu2ZbWidto5xBGxEEfWvCCiUDk00Hg=";
allowedIPs = [ "0.0.0.0/0" "::0/0" ];
}];
};
};
};
virtualisation.docker = {