Create a FREE, PRIVATE, VPN with WireGuard - How To

preview_player
Показать описание
WireGuard is a free, secure, and highly performant VPN that you can deploy to access all of your devices remotely. In this video I provide an overview of WireGuard, share with you a config for setting it up yourself, and provide step-by-step instructions of how to use it.

00:00 - Introduction to WireGuard
00:50 - Benefits of WireGuard vs OpenVPN
01:36 - WireGuard Config Overview
04:51 - Creating a WireGuard Server in Docker
05:47 - Access WireGuard Web GUI
07:13 - Port Forward WireGuard
09:58 - Configure WireGuard on Android
10:40 - Test that it's Working
11:02 - Summary and Outro
Рекомендации по теме
Комментарии
Автор

Very handy. Thanks for putting me onto this. Cheers, Bernie

berniesutton
Автор

Great video, good breakdown on the choice of VPN. Very handy toolset and nice setup guide

tightning
Автор

Thanks for the demo and info, have a great day

chrisumali
Автор

Thanks again Jim ..works like a charm ...

alexplane
Автор

Just found ur channel and subbed thanks love content

kevinhughes
Автор

Thanks Jim, I found tailscale, which uses wire guard as backbone work more seamless. It can bypass blocked udp firewalls, doesn’t require port forwarding (udp hole punching), easier ACL and user management.
Granted you’re handing the handshaking to tailscale but you can run the server locally

drreality
Автор

Hey Jim, love your work. could you please go into depth about MTU... i am so scratching my head around this part. Few days ago, my vpn tunnel was doing 320 ish Mbps download and 50 ish upload while WG TUNNEL is active... but recently it drops for no reasons to 100 ish downloads and upload is still the same around 50 ish upload speed. I already did the fragment test using cmd and it is always at 1392 the last biggest MTU with zero loss.

My router is behind O.N.U. and the router is connected to the wan with PPPoE at 1492 MTU.

Note :
My router is Asus RT-AX82u
My ISP Based package is 300 d / 50 u

redpurple
Автор

I love Wireguard, I use it literally everyday to remotely connect to my network for admin/tinkering. And it's 100% self hosted, unlike some other solutions

BrianPhillipsSKS
Автор

Hi Jim, thank you so much for this video, once again! I have an issue currently that you might be able to help me with. I can connect successfully to my local network but i can only access my services via their IP. I have Nginx setup with domain names and certificates but when i try to access them via their domain name when connected via wireguard i just can't, could it be a DNS issue or something ? Thanks in advance

hugotorres
Автор

Hey there Jim, thank you again for your video. I have a question, is it possible to configure a tunnel to access only certain ports? (I'd like to access only certain app and not the entire server) thank you :)

Robertjaymercer
Автор

how about ipv6? that wireguard only for ipv4, can u please help make for ipv6 please..

cicievie
Автор

But what about the fact that several different devices can use one QR code, is it possible to somehow limit the possibility that when connected using the QR code of the device, it ceases to be valid

simpoz-
Автор

Do you think either this, or a Tailscale video, could show how you could use your Pi-hole on the run also? I'm very tired of adds, when I'm away from home.

JGNiDK
Автор

Hi, I've deployed WireGuard and I'm able to access my internal network over my mobile (5G network). However I can only access it directly to the IP. If I try to connect through the DNS I'm getting or Either for the DNS configured at cloudflare or the ones configured local in my PiHole. At the wireguard docker-compose file I've WG_ALLOWED_IP my entire local/24, and in WG_DEFAULT_DNS I've my internal PiHole IP. At Sophos I have configured a DNAT between WAN and my docker-proxy IP, port 51820 udp. Any clue?

FilipeNeto