FreeBSD Home NAS, part 3: WireGuard VPN, routing, and Linux peers
4 months ago
- #FreeBSD
- #Networking
- #WireGuard
- Setting up a home server on FreeBSD 14.3 to serve as a NAS.
- Configuring WireGuard VPN for secure access between office and home networks.
- Comparison between WireGuard and OpenVPN highlighting WireGuard's advantages like smaller codebase, kernel module operation, and peer-to-peer model.
- Network architecture includes office (192.168.0.0/24) and home (192.168.100.0/24) networks with FreeBSD as the VPN server.
- Installation and configuration of WireGuard on FreeBSD including key generation and firewall settings.
- Setting up WireGuard on Arch Linux client with key exchange and connection establishment.
- Configuring cross-LAN access between office and home networks via routing table adjustments.
- Finalizing Packet Filter (PF) firewall rules to allow traffic between networks and ensure security.