remove unused wireguard
This commit is contained in:
parent
d202456d6b
commit
9addf815c9
@ -541,24 +541,6 @@ in
|
|||||||
security.pam.services.sshd.text = pkgs.lib.mkDefault( pkgs.lib.mkAfter "session optional ${pkgs.pam}/lib/security/pam_exec.so seteuid ${login_mail_alert}/bin/mail_alert.sh" );
|
security.pam.services.sshd.text = pkgs.lib.mkDefault( pkgs.lib.mkAfter "session optional ${pkgs.pam}/lib/security/pam_exec.so seteuid ${login_mail_alert}/bin/mail_alert.sh" );
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
wireguard.interfaces = {
|
|
||||||
wg0 = {
|
|
||||||
ips = [ "192.168.20.1/24" ];
|
|
||||||
privateKeyFile = "/mnt/secrets/wireguard/wg0.privatekey";
|
|
||||||
listenPort = 51820;
|
|
||||||
allowedIPsAsRoutes = true;
|
|
||||||
peers = [
|
|
||||||
{
|
|
||||||
allowedIPs = [ "192.168.20.2/32" ];
|
|
||||||
publicKey = "b/SXiqo+GPdNOc54lyEVeUBc6B5AbVMKh+g5EZPGzlE=";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
nat.internalInterfaces = [ "wg0" ];
|
|
||||||
nat.internalIPs = [ "192.168.20.0/24" ];
|
|
||||||
|
|
||||||
firewall.interfaces.eno2.allowedTCPPorts = [
|
firewall.interfaces.eno2.allowedTCPPorts = [
|
||||||
3260
|
3260
|
||||||
];
|
];
|
||||||
@ -571,9 +553,5 @@ in
|
|||||||
firewall.allowedTCPPortRanges = [
|
firewall.allowedTCPPortRanges = [
|
||||||
{ from = 64000; to = 65535; } # FTP
|
{ from = 64000; to = 65535; } # FTP
|
||||||
];
|
];
|
||||||
|
|
||||||
firewall.allowedUDPPorts = [
|
|
||||||
config.networking.wireguard.interfaces.wg0.listenPort
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -49,7 +49,6 @@
|
|||||||
inetutils
|
inetutils
|
||||||
rclone
|
rclone
|
||||||
lftp
|
lftp
|
||||||
wireguard-tools
|
|
||||||
nfs-utils
|
nfs-utils
|
||||||
nmap
|
nmap
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user