Creating a WireGuard VPN Server on RaspberryPi - 4K TUTORIAL

preview_player
Показать описание
WireGuard is an incredibly fast and simple to setup VPN server and today we are setting it up on a RaspberryPi. This allows you to securely connect back to your home network when you are away. This is great for either travel or setting up remote / offsite backups!

Affiliate Links:

*These are Amazon affiliate links, which means that if you purchase a product through one of them, I will receive a small commission (at no additional cost to you). Thank you for supporting my channel!
Рекомендации по теме
Комментарии
Автор

I went through at least a dozen tutorials that were confusing, long, and ultimately didn't even work. Some even did things off camera, so the viewer missed vital steps.

Came across your vid. It was short sweet, and helped me with an install. Thanks!

Chuck
Автор

Awesome tutorial! You put a lot of work into this one. I like it that you explained every aspect of the setup, not like other guides who are just showing a tiny bit!!! Great work, keep going.

xanderthunder
Автор

I spent a day troubleshooting before I realized I had put 51280 instead of 51820 in my home router. Oh my. Video is so much better than the instructions on any websites. Thank you!

simbatech
Автор

Hi Will, just a quick heads-up on your recommendation to check the contents of any install script downloaded from external sources at 3:15 - that's a sensible piece of advice, but the way you proceed to check the code is _not_ the way to do it! You copy & paste the https URL in your web browser, but that's ignoring the fact that the web server might assess where your https request is coming from and respond differently depending on the type of https client technology (web browser, curl, wget ...). There are (not necessarily malicious) web servers out there known to do just that. Resting in a false sense of security, you may end up installing something completely different than what you saw in your browser. So, _always_ check the script code you're downloading, but do it the very same way as you'll do with your actual download/install command, in this case with curl (e.g. redirect to a file, then check and execute that file).

aquaehelveticae
Автор

So I'm legit loving this channel. So glad I found you.

ThatRandomFastingGuy
Автор

If it wasn't for this video, I would be lost entirely. Thank you so much for making this video. It was very helpful, and thank you for explaining as you go instead of other people where they just skip over entire sections. Thank you so much!!

subwayy
Автор

Yo man, this is great. Your advice is through, especially with checking the code first. I can tell you're nervous cuz I've been in your shoes before, so I just want to let you know you really are doing good here.

MiniArts
Автор

Here from Reddit. Great tutorial - I'll be trying this for sure. Thank you!

ihartmacz
Автор

For those wondering about the forwarding rules that were not included:

PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Add forwarding when VPN is started
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE # Remove forwarding when VPN is shutdown

cshoffie
Автор

Hi SpaceRex - thank you for getting me started on WireGuArd. I have some IMPORTANT suggestions for viewers in 2021 with the intro of Big Sur. The Mac client does not work in Split Tunnel mode with the dns for internet access - it's a bug. There is a simple fix that was hard to search out :: in the mac client.conf simply delete the DNS line altogether. Simple as that!!!

I also had good results with the iOS config to use raspi cli command ... ipvpn -qr <client.conf> ... to show a qr code on my mac terminal that I could scan use the iOS wireguard app to scan on my iPhone.

I am very pleased with WireGuard as I am a long time frustrated previous user of OpenVPN. My next project is to configure a 3 site-to-site VPN. Happy WireGuarding to everyone.

... Mark

markemerson
Автор

Very goor -watched that and your video on why we should use wireguard. Description of conf file great - but you only covered the client on MAC and PC. I generally run the client on my phone or on an Android TV box (proper Android, not the Android TV nonsense). Done ALL of this in OpenVPN many times - just need to complete my notes for Wireguard to include the Android client.

PeterScargill
Автор

Thanks a lot for this very helpful tutorial, got my own VPN running here now! :)

jerometv
Автор

Thanks for doing the video, providing explanations and making it easy to follow along.

fastdyna
Автор

Need a vid on Pi-Hole & Pi-VPN WireGuard together using Wireguard with a 4G Andoid phone

africantwin
Автор

Thank you for the great tutuorial. I installed using your tutorial on ubuntu 21.10 server, (not on raspberry pi), and everything worked well.

levy
Автор

Awesome video...very much informative...I manged to convert my Raspberry Pi into VPN server. Actually I am running openmediavault, FTP, Plex and VPN all on single RPI.

goobiie
Автор

Exactly the video and use case I was looking for. Thanks man, great video.

the_terrorizer
Автор

Same comment as others - your videos are great, very informative and enjoyable to watch 🙂

xpyres
Автор

This is an excellent tutorial! Thank you very much!

lingxunTech
Автор

10:24
Wait, I was told specifically to change the default port number because hackers usually try the default first, and so leaving it as-is presents a security risk. Am I mistaken?

toddneuschatz