Netmaker
wg-easy
Our great sponsors
Netmaker | wg-easy | |
---|---|---|
165 | 20 | |
8,952 | 11,629 | |
2.3% | 6.6% | |
9.6 | 9.8 | |
1 day ago | about 17 hours ago | |
Go | JavaScript | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Netmaker
- Netmaker: An open source WireGuard VPN
-
Connecting several hundreds IoT (raspberry pi's) devices with a VPN
My plan is to set up an EC2 instance and host a VPN, considering options like Netmaker, OpenVPN, or Tailscale. The goal is to connect these devices to the VPN, enabling SSH access from any connected node. This method seems cost-effective(Considering I want to use 100s of devices and potentially 1000s) and straightforward, requiring a simple setup with a sudo apt command on the Raspberry Pi.
-
Remote access to a NAS from another location?
I'm wondering if there are any alternative approaches to achieve this. Is something like Netmaker or Tailscale feasible enough? If you have any suggestions, I'd greatly appreciate it.
-
Would we still create Nebula today?
https://github.com/gravitl/netmaker
Honorable mention:
SuperHighway84 - more of a Usenet-inspired darknet, but I love the concept + the author's personal website:
https://github.com/mrusme/superhighway84
- Show HN: Netmaker – Netmaker Goes Open Source
-
Netmaker Transitions to Open source: Embracing the Apache-2.0 License
Exciting news to share! Netmaker has officially embraced open source. This momentous decision was unveiled at the Open Source Summit in Europe when the pull request successfully merged, transitioning their server from the SSPL to the widely recognized Apache License 2.0.
-
SD-WAN and SASE Solutions
While we've encountered some challenges and worked with vendors like Cisco to find solutions, I'm curious about recommendations for SD-WAN providers that are well-suited for SASE users. This includes not only Zscaler but also other options like Netmaker, Palo Alto, Cloudflare, Cisco, and Forcepoint.
-
Only allowing my home network to access all my EC2 Instances?
Now, my main question is how I can link my DDNS host endpoint with my EC2 instances, allowing only my home network to access them. I've come across a variety of suggestions, such as Netmaker, OpenVPN, Tailscale etc. but I'm curious to hear your opinions on these solutions.
-
CLAs create different issues than making (small) open source contributions
HN is somehow always timely. Currently, these folks expect me to sign a CLA for a one-byte change to their README: https://github.com/gravitl/netmaker/pull/2516
- NetMaker: Connect Everything with a WireGuard VPN
wg-easy
-
PiHole after wireguard install?
Check out wg-easy on GitHub. There is also a wg with pinole on their page. Works so easily together. https://github.com/wg-easy/wg-easy
-
Alternative to Headscale?
sounds like you just want wg-easy.
-
WireHole is a combination of WireGuard, Pi-hole, and Unbound
This wg-easy?
Definitely not an OSI approved license, but does look like they made an attempt in the spirit of GPL, no?
https://github.com/wg-easy/wg-easy/blob/master/LICENSE.md
> You may:
Use this software for yourself;
Use this software for a company;
Modify this software, as long as you:
Publish the changes on GitHub as an open-source & linked fork;
Don't remove any links to the original project or donation pages;
You may not:
Use this software in a commercial product without a license from the original author;
- The Tailscale Universal Docker Mod
-
Who do you use for port forwarding?
wg-easy running in Docker. Then access it using WireGuard on my mobile devices.
-
Netmaker/Tailscale Vs Traditional VPNs
Just plain wg-easy (wireguard with frontend). No 3rd parties involved, just me & my endpoint
-
Is it possible to make a phone connect to a server without having to open any ports on the server side ?
I suggest running a VPN server like wireguard (very easy to install on phone and set up using https://github.com/wg-easy/wg-easy) and have the port open only to that. The VPN will do the rest in terms of NATing ports and whatnot.
- Which is more of a pain in the ass: connecting to databases via SSH tunnels, or whitelisting IP addresses?
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/wg-easy/wg-easy (7.6k stars)
-
Changing Private IP to domain or something locally for selfhosted RSS-Bridge?
I use wg-easy for now https://github.com/wg-easy/wg-easy
What are some alternatives?
tailscale - The easiest, most secure way to use WireGuard and 2FA.
wireguard-ui - Wireguard web interface
headscale - An open source, self-hosted implementation of the Tailscale control server
pivpn - The Simplest VPN installer, designed for Raspberry Pi
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
wg-manager - A easy to use WireGuard dashboard and management tool
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
wg-gen-web - Simple Web based configuration generator for WireGuard
ZeroTier - A Smart Ethernet Switch for Earth
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask