mirror of
https://github.com/hotio/website.git
synced 2026-01-09 07:53:23 +08:00
update annotations
This commit is contained in:
parent
aef2ddc00d
commit
ef2404eab4
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
2. If you need to expose ports on your LAN you can use `VPN_EXPOSE_PORTS_ON_LAN`. For example `VPN_EXPOSE_PORTS_ON_LAN=7878/tcp,9117/tcp`, will block those ports on the vpn interface, so that there's no risk that they might be exposed to the world and allow access to them from your LAN. Some images also have a `WEBUI_PORTS` environment variable that does basically the same for the vpn part. For those apps that support it, it'll also change the port on which the app runs.
|
2. If you need to expose ports on your LAN you can use `VPN_EXPOSE_PORTS_ON_LAN`. For example `VPN_EXPOSE_PORTS_ON_LAN=7878/tcp,9117/tcp`, will block those ports on the vpn interface, so that there's no risk that they might be exposed to the world and allow access to them from your LAN. Some images also have a `WEBUI_PORTS` environment variable that does basically the same for the vpn part. For those apps that support it, it'll also change the port on which the app runs.
|
||||||
|
|
||||||
3. With `net.ipv6.conf.all.disable_ipv6=1` all ipv6 support is disabled. Leave ipv6 disabled and remove all references to it in your `wg0.conf` file to keep things simple. If you need any sort of ipv6 support, enable it with `net.ipv6.conf.all.disable_ipv6=0`. A WireGuard ipv6 endpoint is currently not supported.
|
3. NOT USED
|
||||||
|
|
||||||
4. Possible values are `generic`, `proton` and `pia`.
|
4. Possible values are `generic`, `proton` and `pia`.
|
||||||
Affiliate links:
|
Affiliate links:
|
||||||
@ -16,26 +16,15 @@ Affiliate links:
|
|||||||
|
|
||||||
7. By default a random server is used, but if you prefer a certain region you can fill in the region id. A list of available regions can be found in `/config/wireguard` after the first start. If you're seeing an error message `shuf: getrandom: Function not implemented`, you can't let it pick one randomly and are forced to fill in a region id.
|
7. By default a random server is used, but if you prefer a certain region you can fill in the region id. A list of available regions can be found in `/config/wireguard` after the first start. If you're seeing an error message `shuf: getrandom: Function not implemented`, you can't let it pick one randomly and are forced to fill in a region id.
|
||||||
|
|
||||||
8. With `VPN_CONF` you can set the name used for your WireGuard config. This is an example of how your `wg0.conf` file should look like. If there's a lot of extra stuff, remove it unless you know what it's there for. The WireGuard config is automatically modified to use `AllowedIPs = 0.0.0.0/1,128.0.0.0/1` for compatibility with Synology/QNAP/Asustor/WSL2 systems if you append `-fix`, so `VPN_CONF=wg0-fix`. WSL2 users can also compile their own kernel if they don't wanna use this workaround.
|
8. With `VPN_CONF` you can set the name used for your WireGuard config.
|
||||||
```text
|
|
||||||
[Interface]
|
|
||||||
PrivateKey = supersecretprivatekey
|
|
||||||
Address = xx.xx.xxx.xxx/32 # Yes, /32 in most cases
|
|
||||||
DNS = x.x.x.x
|
|
||||||
|
|
||||||
[Peer]
|
9. NOT USED
|
||||||
PublicKey = publickey
|
|
||||||
AllowedIPs = 0.0.0.0/0
|
|
||||||
Endpoint = xxx.x.xxx.x:51820
|
|
||||||
```
|
|
||||||
|
|
||||||
9. If the WireGuard kernel module is missing (most likely on Synology/QNAP/Asustor), you can run WireGuard in userspace thanks to `wireguard-go`. For that you'll need to add the device `/dev/net/tun`. It's most likely that the device `/dev/net/tun` does not exist however, have a read [here](https://memoryleak.dev/post/fix-tun-tap-not-available-on-a-synology-nas/){: target=_blank rel="noopener" } for instructions on checking and adding the device.
|
|
||||||
|
|
||||||
10. DANGEROUS! Don't enable unless you know what you are doing!
|
10. DANGEROUS! Don't enable unless you know what you are doing!
|
||||||
|
|
||||||
11. When using `VPN_PROVIDER=pia`, fill in your username and password. A `wg0.conf` will be automatically downloaded.
|
11. When using `VPN_PROVIDER=pia`, fill in your username and password. A `wg0.conf` will be automatically downloaded.
|
||||||
|
|
||||||
12. Required in most cases, on some systems that don't have `rp_filter` set to strict, it's optional.
|
12. NOT USED
|
||||||
|
|
||||||
13. Fill in your DIP token here, if you've bought the dedicated ip option.
|
13. Fill in your DIP token here, if you've bought the dedicated ip option.
|
||||||
|
|
||||||
@ -45,7 +34,7 @@ Endpoint = xxx.x.xxx.x:51820
|
|||||||
|
|
||||||
16. Some of the possible values are for example `wg`, `8.8.8.8` or `1.1.1.1@853#cloudflare-dns.com` seperated by a `,`. The value `wg` will use the nameservers from the `wg0.conf` file. A value in the format `8.8.8.8` is to use a plain old nameserver. A value in the format `1.1.1.1@853#cloudflare-dns.com` will add a `DNS over TLS` nameserver, this will override all other regular nameservers. Leaving the variable empty will allow Unbound to work in recursive mode.
|
16. Some of the possible values are for example `wg`, `8.8.8.8` or `1.1.1.1@853#cloudflare-dns.com` seperated by a `,`. The value `wg` will use the nameservers from the `wg0.conf` file. A value in the format `8.8.8.8` is to use a plain old nameserver. A value in the format `1.1.1.1@853#cloudflare-dns.com` will add a `DNS over TLS` nameserver, this will override all other regular nameservers. Leaving the variable empty will allow Unbound to work in recursive mode.
|
||||||
|
|
||||||
17. Possible values are `auto`, `legacy` or `nftables`. The default is `auto`, this will try to use the most modern method available. If this doesn't work, you can try forcing it to `legacy` or `nftables`.
|
17. NOT USED
|
||||||
|
|
||||||
18. If you want to use container hostnames to connect to other containers within a bridge network, you'll have to use `--hostname` and use `container-name.internal` or `container-name.vpn`. Currently `.vpn` is a non existing TLD, but that can change in the future. The TLD `.internal` should become the standard for internal networks, so it's the safest choice.
|
18. If you want to use container hostnames to connect to other containers within a bridge network, you'll have to use `--hostname` and use `container-name.internal` or `container-name.vpn`. Currently `.vpn` is a non existing TLD, but that can change in the future. The TLD `.internal` should become the standard for internal networks, so it's the safest choice.
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user