Let me introduce you to the stupid-proof Wireguard tool called PiVPN.
I've been struggling with wg-easy and wireguard-ui until I found PiVPN. It is terminal based but stupid easy. The name suggest Raspberry Pi but it works on every Debian based distro.
tailscale uses the wireguard protocol so maybe you will find tailscale easier for you? seems like you've tried most of the other solutions, it's a fairly new protocol which was designed to be lightweight so the third party solutions need a little time to mature
Just to clarify... you want to be (for example) be sat in a coffee shop, log in to your vpn and route all your traffic through your home internet connection?
If so, with WG-EASY all you need to do is set the environment WG_ALLOWED_IPS variable to 0.0.0.0/0
It's set to this by default so i'm wondering if this is actually what you're looking for.
More replies
Let me introduce you to the stupid-proof Wireguard tool called PiVPN.
I've been struggling with wg-easy and wireguard-ui until I found PiVPN. It is terminal based but stupid easy. The name suggest Raspberry Pi but it works on every Debian based distro.
More replies
I'd just either use tailscale or selfhost the controlpanel with headscale.
More replies
tailscale uses the wireguard protocol so maybe you will find tailscale easier for you? seems like you've tried most of the other solutions, it's a fairly new protocol which was designed to be lightweight so the third party solutions need a little time to mature
More replies
Just to clarify... you want to be (for example) be sat in a coffee shop, log in to your vpn and route all your traffic through your home internet connection?
If so, with WG-EASY all you need to do is set the environment WG_ALLOWED_IPS variable to 0.0.0.0/0
It's set to this by default so i'm wondering if this is actually what you're looking for.
More replies