wireguard-ui
wg-easy
Our great sponsors
wireguard-ui | wg-easy | |
---|---|---|
29 | 186 | |
3,523 | 7,136 | |
- | - | |
8.0 | 5.8 | |
about 2 months ago | 12 months ago | |
Go | HTML | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wireguard-ui
-
IPv6 Breaks Android Apps
# This file was generated using wireguard-ui (https://github.com/ngoduykhanh/wireguard-ui) # Please don't modify it manually, otherwise your change might get replaced. [Interface] Address = 10.25.0.1/24,2001:db8:abcd:AA10::1/60 ListenPort = 51820 PrivateKey = MTU = 1420 PostUp = iptables -A FORWARD -i wg0 -o wg0 -j ACCEPT PostUp = iptables -t nat -A POSTROUTING -s 10.25.0.0/24 -o eth0 -j MASQUERADE PostUp = iptables -A INPUT -p udp -m udp --dport 51820 -j ACCEPT PostDown = Table = auto [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.2/32,192.168.32.0/24,192.168.56.0/24,2001:db8:abcd:aa11::/64 # AllowedIPs are for site to site connection [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.3/32,10.0.0.0/16,2001:db8:abcd:aa12::/64 [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.4/32,2001:db8:abcd:aa13::/64 [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.5/32,2001:db8:abcd:aa14::/64 [Peer] PublicKey = PresharedKey = AllowedIPs = 10.25.0.6/32,2001:db8:abcd:aa15::/64
-
Wireguard - how are you generating client configurations for your users?
My previous experience was using this wireguard-ui container, super easy to create clients, and spits out a config file and/or QR code. Couldn't be any easier and removes all of the mumbo jumbo from the client's hands. And how that I'm looking at that package again I think I could potentially map it to the router's API, assuming there is one available for the VPN configs.
-
wireguard not connecting
Wireguard log Uname info: Linux wireguard 6.2.0-20-generic #20-Ubuntu SMP PREEMPT_DYNAMIC Thu Apr 6 07:48:48 UTC 2023 x86_64 GNU/Linux 2023-08-13 22:01:40 **** It seems the wireguard module is already active. Skipping kernel header install and module compilation. **** 2023-08-13 22:01:41 **** Server mode is selected **** 2023-08-13 22:01:41 **** PersistentKeepalive will be set for: all **** 2023-08-13 22:01:42 **** SERVERURL var is either not set or is set to "auto", setting external IP to auto detected value of 78.72.85.114 **** 2023-08-13 22:01:42 **** External server port is set to 51820. Make sure that port is properly forwarded to port 51820 inside this container **** 2023-08-13 22:01:42 **** Internal subnet is set to 10.13.13.0 **** 2023-08-13 22:01:42 **** AllowedIPs for peers 0.0.0.0/0 **** 2023-08-13 22:01:42 **** PEERDNS var is either not set or is set to "auto", setting peer DNS to 10.13.13.1 to use wireguard docker host's DNS. **** 2023-08-13 22:01:42 **** Server mode is selected **** 2023-08-13 22:01:42 **** No changes to parameters. Existing configs are used. **** 2023-08-13 22:01:42 [custom-init] No custom files found, skipping... 2023-08-13 22:01:46 .:53 2023-08-13 22:01:46 CoreDNS-1.10.1 2023-08-13 22:01:46 linux/amd64, go1.20.7, 2023-08-13 22:01:47 [#] ip link add wg0 type wireguard 2023-08-13 22:01:47 [#] wg setconf wg0 /dev/fd/63 2023-08-13 22:01:47 [#] ip -4 address add 10.13.13.1 dev wg0 2023-08-13 22:01:47 [#] ip link set mtu 1420 up dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.5/32 dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.4/32 dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.3/32 dev wg0 2023-08-13 22:01:47 [#] ip -4 route add 10.13.13.2/32 dev wg0 2023-08-13 22:01:47 [#] iptables -A FORWARD -i wg0 -j ACCEPT; iptables -A FORWARD -o wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth+ -j MASQUERADE 2023-08-13 22:01:47 [ls.io-init] done. wireguard ui logs 2023-08-13 21:50:03 ⇨ http server started on [::]:5000 2023-08-13 22:01:20 [#] ip link delete dev wg0 2023-08-13 22:01:21 [#] iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o wg0 -j MASQUERADE 2023-08-13 22:01:27 [#] ip link add wg0 type wireguard 2023-08-13 22:01:27 [#] wg setconf wg0 /dev/fd/63 2023-08-13 22:01:27 [#] ip -4 address add 10.252.1.0/24 dev wg0 2023-08-13 22:01:27 [#] ip link set mtu 1450 up dev wg0 2023-08-13 22:01:27 [#] iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o wg0 -j MASQUERADE 2023-08-13 22:01:29 Wireguard UI 2023-08-13 22:01:29 App Version : dev 2023-08-13 22:01:29 Git Commit : b55543f 2023-08-13 22:01:29 Git Ref : N/A 2023-08-13 22:01:29 Build Time : 08-13-2023 20:01:29 2023-08-13 22:01:29 Git Repo : https://github.com/ngoduykhanh/wireguard-ui 2023-08-13 22:01:29 Authentication : true 2023-08-13 22:01:29 Bind address : 0.0.0.0:5000 2023-08-13 22:01:29 Email from : 2023-08-13 22:01:29 Email from name : WireGuard UI 2023-08-13 22:01:29 Custom wg.conf : 2023-08-13 22:01:29 Base path : / 2023-08-13 22:01:29 ⇨ http server started on [::]:5000
-
Remote multi user editing
you can always setup wireguard on your vps. its not that hard, this article by digital ocean article is quite thorough. That article has a lot on information so it looks harder than it actually is. You could also use something like this to help set things up faster. ive used that ui before but dont actively host it, only when i need to add peers. If you do actively host the ui make sure you dont expose it to the internet. Not because there is some security issue just because its imo not best practice. You can also use hamachi or any of the other hamachi like services
-
Wireguard without VPS?
Maybe this, https://github.com/ngoduykhanh/wireguard-ui
-
unable to route traffic via Wireguard tunnel
I have 2 VPS servers running Debian 11. I have installed Wireguard, and Wureguard UI I can connect those two sites, but there is no traffic going between them. I want to create Site to site tunnel. And than later I Will also want to create Client VPN so I can use it on my laptop when needed. but currently I am not able to get any traffic between those 2 VPS servers.
-
Help needed with setup to local network
A couple of days ago I stumbled upon this awesome project (https://github.com/ngoduykhanh/wireguard-ui). I immediately tried to get it running in order to access my local home network from the outside.
-
ngoduykhanh / wireguard-ui - Default Client Subnet
# This file was generated using wireguard-ui (https://github.com/ngoduykhanh/wireguard-ui)
-
Wireguard container and ngoduykhanh / wireguard-ui
Hello, i am running wireguard in a container on a raspberry4 with the docker-compose.yml from linuxserver. I'd like now to use a gui but I am stuck with the docker-compose example from ngoduykhanh / wireguard-ui
-
Add WireGuard VPN on my exicting PI-hole+unbound ubuntu DNS server on my old laptop.
Personally, I’ve stopped using pi VPN quite a while ago. I’ve only used there console interface. Don’t know if there’s a official GUI by now. But there are a few gui alternatives available. I’ve been using this: https://github.com/ngoduykhanh/wireguard-ui
wg-easy
-
Admin-Friendly Mesh VPN with WireGuard?
After browsing through, I've noticed that three options seem to be gaining traction: Netmaker, wg-easy, and headscale. I'm curious to know if these solutions are interchangeable, and if there are specific reasons to choose one over the others. I'd also like to understand if they are complete stacks, meaning, once set up, could I easily replace one admin GUI with another, or would I need to tear down and rebuild the VPN?
-
VPN to bypass Country blocms
WireGuard is the solution to everything! It has an app and they can easily login via a QR code that you send them. For the server I would recommend wg-easy, there you can manage all user accounts in a web interface.
-
Wireguard without VPS?
I use this, https://github.com/WeeJeWel/wg-easy
-
What are some security/VPN features you would like to see in UniFi Network?
Dashboard with access to the QR and config files for clients as well as bandwidth data. Even something as simple as wg-easy would be great.
- Self hosted public DNS Server
-
Build your own private WireGuard VPN with PiVPN
I run wg-easy https://github.com/WeeJeWel/wg-easy for this sort of thing. I use the docker container, and it's great. "Just works".
Also, unrelated, I just decided I don't like the sentiment of "PiMyProjectName" branding. I know most projects don't just run on a Pi, and that the intent is to say "you can self-host thing", but at this point if you want to run a home server sort of thing, just buy some cheap 100-200 dollar minipc thing. That's how much you'd pay for a Pi now anyway, and it comes with such great features as:
* just establishing an ssh connection doesn't take multiple seconds
* the ethernet doesn't go over a usb hub
* it doesn't run on an sd card that is going to fail within a year
I'm pretty dismissive of ARM chips for homelab stuff at this point. There's super cheap minipcs with "real" processors that will just destroy even an expensive ARM board.
Pi's shine with their ability to run both a real/full Linux and also do gpio type stuff that otherwise is usually an arduino board. I don't have anything against low-level programming but damn is it just a lot more fun to do in python. I love the Rpi zero w 2 products for this, just enough juice to run wifi and a python loop, plus the gpio pins. Too bad they've been sold out for literally years.
- Seft-host VPNs recommendation regarding power efficiency
-
[Wireguard] Le serveur ne peut pas faire un ping au client
J'ai installé Wireguard Server sur un VPS en utilisant [https://github.com/weejewel/wg-easy Peer to Peer Ping, mais je ne peux pas ping-ping à des pairs du serveur.
-
Using AWS EC2 as a proxy server to bypass a Minecraft VPNGuard server block or run a Minecraft server from your home while hiding the public IP
To expand: I'd recommend wireguard it's super easy to run with docker, openvpn is way more annoying to setup The Github page for wg-easy docker image
-
Today is a lovely day to setup my new media server. X220 i5, 512GB msata SSD (slow af), 1TB internal HDD, and another terabyte in the dock. Installing Ubuntu server 22.04 LTS. Any fun ideas for what to do with it, aside from a Jellyfin server and samba share?
for wireguard im using wg-easy
What are some alternatives?
wg-ui - WireGuard Web UI for self-serve client configurations, with optional auth.
wg-manager - A easy to use WireGuard dashboard and management tool
wg-portal - WireGuard Configuration Portal with LDAP connection
wg-gen-web - Simple Web based configuration generator for WireGuard
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask
Wireguard-Manager-and-API - A Wireguard VPN Server Manager and API to add and remove clients
pivpn - The Simplest VPN installer, designed for Raspberry Pi
watchman - Watches files and records, or triggers actions, when they change.
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface