b45f742ea8f5cffb32d9b2f3ce9cc2cbe0dfd8ca
howto/wireguard.md
| ... | ... | @@ -24,7 +24,7 @@ ListenPort = <YOUR_LOCAL_UDP_PORT> |
| 24 | 24 | [Peer] |
| 25 | 25 | PublicKey = <public_key_of_your_peer> |
| 26 | 26 | # at least one peer needs to provide this one |
| 27 | -Endpoint = <end_post_hostname_or_ip:port> |
|
| 27 | +Endpoint = <end_point_hostname_or_ip:port> |
|
| 28 | 28 | # in theory this could be restricted to dn42 networks, |
| 29 | 29 | # however it is easier to do this with iptables/bgp filters/routing table |
| 30 | 30 | # instead just like for openvpn-based peerings |
| ... | ... | @@ -48,7 +48,7 @@ $ ip link set <interface_name> up |
| 48 | 48 | |
| 49 | 49 | Mic92 uses this [script](https://github.com/Mic92/bird-dn42/tree/master/wireguard) to automate this |
| 50 | 50 | |
| 51 | -Maybe you should check the MTU to your peer with e.g. `ping -s 1472 <peer ip>`. If your output looks like `From gateway.local (192.168.0.1) icmp_seq=1 Frag needed and DF set (mtu = <MTU>)` substract `80` from the MTU and set it via `ip link set dev <interface_name> mtu <calculated_mtu>` |
|
| 51 | +Maybe you should check the MTU to your peer with e.g. `ping -s 1472 <end_point_hostname_or_ip>`. If your output looks like `From gateway.local (192.168.0.1) icmp_seq=1 Frag needed and DF set (mtu = <MTU>)` substract `80` from the MTU and set it via `ip link set dev <interface_name> mtu <calculated_mtu>` |
|
| 52 | 52 | |
| 53 | 53 | ## Testing |
| 54 | 54 |