diff --git a/firestar/wireguard.nix b/firestar/wireguard.nix index 88f8bec..fb8db1b 100644 --- a/firestar/wireguard.nix +++ b/firestar/wireguard.nix @@ -7,13 +7,24 @@ networking.wg-quick.interfaces = { wg0 = { - address = [ "192.168.5.10/24" ]; - dns = [ "192.168.5.1" ]; + address = [ + "192.168.5.10/24" + "2001:db8:5::10/64" + ]; + dns = [ + "192.168.5.1" + "2001:db8:5::1" + ]; privateKeyFile = "/etc/wireguard/privatekey"; peers = [ { - publicKey = "lQYGzNIxgUrDmU32rlnmnc72dK7TSH7hxts3tMtE+VQ="; - allowedIPs = [ "192.168.5.0/24" "192.168.6.0/24" "192.168.20.0/24" ]; + publicKey = "v+asDVK/1TMuQCvCWBwUYZpVgj+PGgdhvcvJXOVN0Xo="; + allowedIPs = [ + "192.168.5.0/24" + "192.168.20.0/24" + "2001:db8:5::/64" + "2001:db8:20::/64" + ]; endpoint = "wg.asonix.dog:51820"; persistentKeepalive = 25; } diff --git a/graystripe/wireguard.nix b/graystripe/wireguard.nix index 6d1ce94..e15ecba 100644 --- a/graystripe/wireguard.nix +++ b/graystripe/wireguard.nix @@ -7,15 +7,25 @@ networking.wg-quick.interfaces = { wg0 = { - address = [ "192.168.5.9/24" ]; - dns = [ "192.168.5.1" ]; + address = [ + "192.168.5.11/24" + "2001:db8:5::11/64" + ]; + dns = [ + "192.168.5.1" + "2001:db8:5::1" + ]; privateKeyFile = "/etc/wireguard/privatekey"; peers = [ { - publicKey = "lQYGzNIxgUrDmU32rlnmnc72dK7TSH7hxts3tMtE+VQ="; - allowedIPs = [ "192.168.5.0/24" "192.168.6.0/24" "192.168.20.0/24" ]; - # endpoint = "wg.asonix.dog:51820"; - endpoint = "76.210.190.151:51820"; + publicKey = "v+asDVK/1TMuQCvCWBwUYZpVgj+PGgdhvcvJXOVN0Xo="; + allowedIPs = [ + "192.168.5.0/24" + "192.168.20.0/24" + "2001:db8:5::/64" + "2001:db8:20::/64" + ]; + endpoint = "wg.asonix.dog:51820"; persistentKeepalive = 25; } ]; diff --git a/squirrelflight/wireguard.nix b/squirrelflight/wireguard.nix index ccebfee..eac9a0a 100644 --- a/squirrelflight/wireguard.nix +++ b/squirrelflight/wireguard.nix @@ -7,15 +7,25 @@ networking.wg-quick.interfaces = { wg0 = { - address = [ "192.168.5.14/24" ]; - dns = [ "192.168.5.1" ]; + address = [ + "192.168.5.12/24" + "2001:db8:5::12/64" + ]; + dns = [ + "192.168.5.1" + "2001:db8:5::1" + ]; privateKeyFile = "/etc/wireguard/privatekey"; peers = [ { - publicKey = "lQYGzNIxgUrDmU32rlnmnc72dK7TSH7hxts3tMtE+VQ="; - allowedIPs = [ "192.168.5.0/24" "192.168.6.0/24" "192.168.20.0/24" ]; - # endpoint = "wg.asonix.dog:51820"; - endpoint = "76.210.190.151:51820"; + publicKey = "v+asDVK/1TMuQCvCWBwUYZpVgj+PGgdhvcvJXOVN0Xo="; + allowedIPs = [ + "192.168.5.0/24" + "192.168.20.0/24" + "2001:db8:5::/64" + "2001:db8:20::/64" + ]; + endpoint = "wg.asonix.dog:51820"; persistentKeepalive = 25; } ];