We'll use these IPs to route traffic between the sites using static routes, OSPF, iBGP, etc. Let's add IP addresses to those new virtual WireGuard interfaces before going any further. ![]() We can see the certificates on the West router: > interface/wireguard/printĠ R name="West" mtu=1420 listen-port=13231 private-key="uEUUufex2/C36952pAj2+8Vq2/Z3Ovf+g59QoYTYbEg=" public-key="JXx83B44YTdZXgUyBgkoJHqGEt3ZO5Mra61C+EW1XXk="Īnd on the East router as well: > interface/wireguard/printĠ R name="East" mtu=1420 listen-port=13231 private-key="SP5dLklX/7dRrfEmequW+bJVisAx4ajMF/VzdYHv30U=" public-key="0tcvcpdup2e8MTJhPyzK7F/USrKjnJbzCfQKGI7VlwA=" We want to securely connect these routers so their respective 10.X/8 LANs can communicate.įirst, we'll create a WireGuard interface on the West router: interface/wireguard/add name=West comment="West WireGuard" listen-port=13231Īnd then on the East router: interface/wireguard/add name=East comment="East WireGuard" listen-port=13231Ĭreating the interface automatically generates public and private keys for encrypting the connection between devices. ![]() Two routers - one West and the other East - both with a public IP address and an internet connection.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |