Compare commits

..

2 Commits

Author SHA1 Message Date
529c409985 simpler ssh config 2025-06-26 11:21:38 +02:00
e33f18e990 VPN updates
vpn interface names

vpn config fix
2025-06-26 11:21:38 +02:00
3 changed files with 10 additions and 15 deletions

View File

@@ -1,6 +1,6 @@
{
networking.wg-quick.interfaces = {
wg-felix-hurricane = {
wg-felix = {
address = ["10.8.0.4/24"];
dns = ["192.168.0.128"];
privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/Felix-Hurricane-pk";
@@ -16,20 +16,20 @@
];
};
wg-csb-hurricane = {
wg-csb = {
address = ["192.168.108.17/22" "2a02:9a0:102:108::17/64"];
privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/CSB-Hurricane-pk";
peers = [
{
publicKey = "mTORKHkPcp9+c7VXqVfVseIOQZuJftoUYA0pBe87bDQ=";
allowedIPs = ["10.0.0.0/8" "172.18.0.0/16" "192.168.3.0/24" "192.168.10.0/24" "192.168.108.0/22" "2a02:9a0:102:108::/64" "2a02:9a0:ffff::/48"];
allowedIPs = ["172.18.0.0/16" "192.168.3.0/24" "192.168.108.0/22" "2a02:9a0:102:108::/64" "2a02:9a0:ffff::/48"];
endpoint = "prod-net-vpn1.infra.brainmill.com:51819";
persistentKeepalive = 25;
}
];
};
wg-fg-hurricane = {
wg-fg = {
address = ["10.255.11.11/24" "2a02:9a0:300:fff0:11::11/64"];
privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/FG-Hurricane-pk";
peers = [
@@ -42,7 +42,7 @@
];
};
wg-neanet-hurricane = {
wg-neanet = {
address = ["192.168.108.25/32" "2a09:2681:204:1::27/64"];
privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/Neanet-Hurricane-pk";
peers = [

View File

@@ -1,6 +1,6 @@
{
networking.wg-quick.interfaces = {
wg-felix-wildfire = {
wg-felix = {
address = ["10.8.0.5/24"];
dns = ["192.168.0.128"];
privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/Felix-Wildfire-pk";
@@ -15,20 +15,20 @@
];
};
wg-csb-wildfire = {
wg-csb = {
address = ["192.168.108.27/22" "2a02:9a0:102:108::b/64"];
privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/CSB-Wildfire-pk";
peers = [
{
publicKey = "mTORKHkPcp9+c7VXqVfVseIOQZuJftoUYA0pBe87bDQ=";
allowedIPs = ["10.0.0.0/8" "172.18.0.0/16" "192.168.3.0/24" "192.168.10.0/24" "192.168.108.0/22" "2a02:9a0:102:108::/64" "2a02:9a0:ffff::/48"];
allowedIPs = ["172.18.0.0/16" "192.168.3.0/24" "192.168.108.0/22" "2a02:9a0:102:108::/64" "2a02:9a0:ffff::/48"];
endpoint = "prod-net-vpn1.infra.brainmill.com:51819";
persistentKeepalive = 25;
}
];
};
# wg-fg-wildfire = {
# wg-fg = {
# address = ["10.255.11.11/24" "2a02:9a0:300:fff0:11::11/64"];
# privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/FG-Wildfire-pk";
# peers = [
@@ -41,7 +41,7 @@
# ];
# };
#
# wg-neanet-wildfire = {
# wg-neanet = {
# address = ["192.168.108.25/32" "2a09:2681:204:1::27/64"];
# privateKeyFile = "/home/schulze/Nextcloud/secrets/wireguard/Neanet-Wildfire-pk";
# peers = [

View File

@@ -7,23 +7,18 @@
matchBlocks = {
"d10.csb.brainmill.com" = {
forwardAgent = true;
port = 22;
};
"prod-admin-jump1.infra.csbnet.se" = {
forwardAgent = true;
port = 22;
};
"prod-jump-got1.infra.brainmill.com" = {
forwardAgent = true;
port = 22;
};
"gw1.net.chsfg.se" = {
forwardAgent = true;
hostname = "2a02:9a0:fffe:4::3";
};
"gw2.net.chsfg.se" = {
forwardAgent = true;
hostname = "2a02:9a0:fffe:4::5";
};
"cv11-stor-gw.net.chsfg.se" = {
proxyCommand = "ssh prod-admin-jump1.infra.csbnet.se /bin/nc %h 22";