{"id":1392,"date":"2024-11-05T13:42:27","date_gmt":"2024-11-05T12:42:27","guid":{"rendered":"https:\/\/artheodoc.fr\/?page_id=1392"},"modified":"2026-02-16T07:49:42","modified_gmt":"2026-02-16T06:49:42","slug":"installation-sous-alpine-linux-du-serveur-vpn-wireguard","status":"publish","type":"page","link":"https:\/\/artheodoc.fr\/index.php\/installation-sous-alpine-linux-du-serveur-vpn-wireguard\/","title":{"rendered":"Installation sous Alpine Linux du serveur VPN WireGuard"},"content":{"rendered":"\n<div class=\"wp-block-group has-background is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#f6e4be\">\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"107\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/11\/Logo_of_WireGuard.svg_.png\" alt=\"\" class=\"wp-image-1452\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/11\/Logo_of_WireGuard.svg_.png 600w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/11\/Logo_of_WireGuard.svg_-300x54.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-background is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#d9ecf7\">\n<p><em>Cette proc\u00e9dure a \u00e9t\u00e9 cr\u00e9\u00e9e dans la cadre de l&rsquo;association Niortaise M\u00e9moire Vive. Si vous avez des suggestions pour l&rsquo;am\u00e9liorer n&rsquo;h\u00e9sitez pas \u00e0 me contacter.<\/em><\/p>\n\n\n\n<p><em>Dominique Renaudeau<\/em><\/p>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p><strong>Param\u00e8tres de mon serveur sous <a href=\"https:\/\/artheodoc.fr\/index.php\/alpine-linux\/\" data-type=\"page\" data-id=\"1365\" target=\"_blank\" rel=\"noreferrer noopener\">Alpine Linux<\/a><\/strong><\/p>\n\n\n\n<p>IP <strong>192.168.1.***<\/strong> (fixe) &#8211; Port SSH :<strong> 22**<\/strong><\/p>\n\n\n\n<p><strong>Box<\/strong><\/p>\n\n\n\n<p>Ajout d\u2019un transfert de port UDP dans la box : port<strong> 518**<\/strong> vers <strong>192.168.1.***<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group has-background is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#d9ecf7\">\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"858\" height=\"483\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/11\/VPN-WireGuard.png\" alt=\"\" class=\"wp-image-1420\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/11\/VPN-WireGuard.png 858w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/11\/VPN-WireGuard-300x169.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/11\/VPN-WireGuard-768x432.png 768w\" sizes=\"auto, (max-width: 858px) 100vw, 858px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-pale-ocean-gradient-background has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-medium-font-size\"><strong>Param\u00e8tres \u00e0 remplacer :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>192.168,1,***<\/strong> &#8211; Adresse IP de votre serveur VPN WireGuard.<\/li>\n\n\n\n<li><strong>22**<\/strong> &#8211; Port SSH, 22 par d\u00e9faut, <a href=\"https:\/\/artheodoc.fr\/index.php\/changer-le-port-pour-ssh\/\" data-type=\"page\" data-id=\"50\" target=\"_blank\" rel=\"noreferrer noopener\">on peut le personnaliser<\/a>.<\/li>\n\n\n\n<li><strong>518**<\/strong> &#8211; Port utilis\u00e9 par le serveur VPN WireGuard,<\/li>\n\n\n\n<li>Le r\u00e9seau pour le VPN est le <strong>10.5.0.0\/24<\/strong>, l&rsquo;IP du serveur <strong>10.5.0.1<\/strong>, l&rsquo;IP pour le client <strong>10.5.0.3<\/strong> (<em>vous pouvez modifier ces param\u00e8tres)<\/em>.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation du serveur Wiregard<\/strong><\/h2>\n\n\n\n<p>Les commandes sont \u00e0 ex\u00e9cuter en administrateur root (<strong>su<\/strong>).<\/p>\n\n\n\n<p>On se connecte en SSH depuis Linux ou Windows avec <a href=\"https:\/\/artheodoc.fr\/index.php\/utilisation-de-putty-depuis-le-reseau-local-ou-a-distance\/\" data-type=\"page\" data-id=\"54\" target=\"_blank\" rel=\"noreferrer noopener\">PuTTY<\/a> pour l\u2019installation (<em>adaptez utilisateur, IP et port SSH<\/em>) :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>ssh <em>utilisateur<\/em>@192.168.1.*** -p 22**<\/strong><\/pre>\n\n\n\n<p>Se connecter en root : <strong>su<\/strong><\/p>\n\n\n\n<p>Inspir\u00e9 de ce tuto, <a href=\"https:\/\/www.justegeek.fr\/tuto-creer-un-serveur-vpn-wireguard-sous-debian-11\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.justegeek.fr\/tuto-creer-un-serveur-vpn-wireguard-sous-debian-11\/<\/a><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk update<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk add wireguard-tools<\/strong><\/pre>\n\n\n\n<p>On g\u00e9n\u00e8re les cl\u00e9s :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>wg genkey | tee \/etc\/wireguard\/privatekey | wg pubkey &gt; \/etc\/wireguard\/publickey<\/strong><\/pre>\n\n\n\n<p>La cl\u00e9 priv\u00e9e sera dans le fichier \/etc\/wireguard\/privatekey :<\/p>\n\n\n\n<p>gJ**********************************************01c=<\/p>\n\n\n\n<p>La cl\u00e9 publique sera dans le fichier \/etc\/wireguard\/publickey :<\/p>\n\n\n\n<p>bP**********************************************HQ=<\/p>\n\n\n\n<p><em>On peut faire un <\/em><strong><em>cat<\/em><\/strong><em> des fichiers pour visualiser les cl\u00e9s.<\/em><\/p>\n\n\n\n<p><strong>On cr\u00e9e le fichier de configuration sous Linux Alpine<\/strong><\/p>\n\n\n\n<p>Pour v\u00e9rifier si le paquet <a href=\"https:\/\/artheodoc.fr\/index.php\/lediteur-de-texte-nano\/\" data-type=\"page\" data-id=\"972\" target=\"_blank\" rel=\"noreferrer noopener\">nano<\/a> est install\u00e9, la commande affichera son nom :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk info -e nano<\/strong><\/pre>\n\n\n\n<p>Intallation de nano :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk add nano<\/strong><\/pre>\n\n\n\n<p>Pour cr\u00e9er le fichier:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>nano \/etc\/wireguard\/wg0.conf<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f2e7cc\"><code># fichier de configuration\n\n&#91;Interface]\n\n# Adresse IP du serveur \u00e0 l\u2019int\u00e9rieur du VPN\n\nAddress = 10.5.0.1\/24\n\n# Cl\u00e9 priv\u00e9e du serveur\n\nPrivateKey = gJ**********************************************01c=\n\nListenPort =&nbsp; 518**\n\n# Activer le routage du trafic vers le r\u00e9seau local\n\nPostUp = iptables -A FORWARD -i wg0 -d 192.168.1.0\/24 -j ACCEPT\n\nPostUp = iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE\n\nPostDown = iptables -D FORWARD -i wg0 -d 192.168.1.0\/24 -j ACCEPT\n\nPostDown = iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE\n\n&#91;Peer]\n\n# Cl\u00e9 publique du client\n\nPublicKey = sR*********************************************Ak=\n\n# Adresse IP que le client peut utiliser \u00e0 l\u2019interieur du VPN\n\nAllowedIPs = 10.5.0.3\/24<\/code><\/pre>\n\n\n\n<p>Apr\u00e8s avoir modifi\u00e9 votre fichier vous pouvez enregistrer les modifications et quitter Nano&nbsp;:<\/p>\n\n\n\n<p><strong>[Ctrl]<\/strong> + <strong>[X]<\/strong><\/p>\n\n\n\n<p><strong>[O]<\/strong><\/p>\n\n\n\n<p><strong>[Entr\u00e9e]<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Si l\u2019on veut r\u00e9aliser la proc\u00e9dure sur un autre type de syst\u00e8me Linux penser \u00e0 adapter le nom de l\u2019interface r\u00e9seau du serveur (<strong>eth0<\/strong> ici).<\/em><\/li>\n\n\n\n<li><em>Dans notre exemple, \u00e0 l&rsquo;int\u00e9rieure du VPN, le serveur a l&rsquo;IP <strong>10.5.0.1\/24<\/strong> et le client <strong>10.5.0.3\/24<\/strong>. Le \/24 correspond au masque 255.255.255.0. Le r\u00e9seau local est le <strong>192.168.1.0\/24<\/strong>.<\/em><\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-e92d2c09e0567a3475f84298b518cdba\" style=\"color:#058b5a\"><em>La technique de l&rsquo;IP masquerade, ou **mascarade IP**, permet \u00e0 un r\u00e9seau priv\u00e9 de dissimuler ses adresses IP internes derri\u00e8re une seule adresse IP publique. Utilis\u00e9e dans le cadre de la traduction d&rsquo;adresses r\u00e9seau (NAT), elle permet aux appareils d&rsquo;un r\u00e9seau local d&rsquo;acc\u00e9der \u00e0 Internet en utilisant une seule adresse IP externe, simplifiant la gestion des adresses IP et renfor\u00e7ant la s\u00e9curit\u00e9 du r\u00e9seau interne.<\/em><\/p>\n\n\n\n<div class=\"wp-block-group has-pale-ocean-gradient-background has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><strong>Explications :<\/strong><\/p>\n\n\n\n<p><strong>[Interface]<\/strong> : Contient les param\u00e8tres de l\u2019interface Wiregard sur le serveur.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Address : Adresse IP que le serveur utilisera \u00e0l\u2019int\u00e9rieur du VPN.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Privatekey : La cl\u00e9&nbsp;priv\u00e9e du serveur, qui doit \u00eatre gard\u00e9e secr\u00e8te.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ListenPort : Le port sur&nbsp;lequel le serveur \u00e9coute les connexions WireGuard.<\/li>\n<\/ul>\n\n\n\n<p><strong>[Peer]<\/strong> : Contient les param\u00e8tres pour un client (<em><strong>une section [Peer] pour chaque client<\/strong><\/em>).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Publickey : La cl\u00e9&nbsp;publique du client, qui permet au serveur de l\u2019identifier.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AllowedIPs : Les&nbsp;adresses IP que le client est autoris\u00e9 \u00e0 utiliser \u00e0 l\u2019interieur&nbsp;du VPN.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<p><strong>Activer le routage IP sur le serveur<\/strong><\/p>\n\n\n\n<p>Activer l&rsquo;<strong>IP forwarding<\/strong> (L&rsquo;IP forwarding est le processus par lequel un appareil r\u00e9seau, tel qu&rsquo;un routeur, transf\u00e8re ou relaie des paquets IP).<\/p>\n\n\n\n<p>Pour appliquer la commande imm\u00e9diatement le temps de la session :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>sysctl -w net.ipv4.ip_forward=1<\/strong><\/pre>\n\n\n\n<p>Pour que la commande persiste apr\u00e8s un red\u00e9marrage on \u00e9dite le fichier sysctl.conf :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>nano \/etc\/sysctl.d\/local.conf<\/strong><\/pre>\n\n\n\n<p>Ajouter la ligne dans le fichier :<\/p>\n\n\n\n<p><strong>net.ipv4.ip_forward=1<\/strong><\/p>\n\n\n\n<p>V\u00e9rifier si le service sysctl est activ\u00e9&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong><strong>service sysctl status<\/strong><\/strong><\/pre>\n\n\n\n<p>Si le service est actif, vous devriez voir une ligne comme :<\/p>\n\n\n\n<p><strong>status: started<\/strong><\/p>\n\n\n\n<p>Si le service n\u2019est pas activ\u00e9, ex\u00e9cutez :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>rc-update add sysctl boot<\/strong><\/pre>\n\n\n\n<p>Pour appliquer les param\u00e8tres sysctl sans attendre le prochain red\u00e9marrage :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>service sysctl start<\/strong><\/pre>\n\n\n\n<p>Pour confirmer que vos param\u00e8tres (comme <code>net.ipv4.ip_forward=1<\/code>) sont bien charg\u00e9s, utilisez :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>sysctl -a | grep net.ipv4.ip_forward<\/strong><\/pre>\n\n\n\n<p>Pour v\u00e9rifier si le paquet iptables est install\u00e9, la command affichera son nom :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk info -e iptables<\/strong><\/pre>\n\n\n\n<p>Sinon installation d&rsquo;iptables :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk add iptables<\/strong><\/pre>\n\n\n\n<p>Quand tout est pr\u00eat on d\u00e9marre l&rsquo;interface :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>wg-quick up wg0<\/strong><\/pre>\n\n\n\n<p>[#] ip link add wg0 type wireguard<\/p>\n\n\n\n<p>[#] wg setconf wg0 \/dev\/fd\/63<\/p>\n\n\n\n<p>[#] ip -4 address add 10.5.0.1\/24 dev wg0<\/p>\n\n\n\n<p>[#] ip link set mtu 1420 up dev wg0<\/p>\n\n\n\n<p>[#] iptables -A FORWARD -i wg0 -d 192.168.1.0\/24 -j ACCEPT<\/p>\n\n\n\n<p>[#] iptables -t nat -A POSTROUTING -o ens18 -j MASQUERADE<\/p>\n\n\n\n<p>et on regarde :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>wg show wg0<\/strong><\/pre>\n\n\n\n<p>Ajouter une r\u00e8gle dans la cha\u00eene INPUT pour accepter tout trafic entrant sur le port 51879 en utilisant le protocole UDP :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>iptables -A INPUT -p udp --dport 518** -j ACCEPT<\/strong><\/pre>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-95b0246e30aff6f317e1f527536e48ad\" style=\"color:#058b5a\"><em>J\u2019ai ajout\u00e9 cette r\u00e8gle, mais je n\u2019ai pas fait en sorte qu\u2019elle soit enregistr\u00e9e, pourtant apr\u00e8s un red\u00e9marrage sans que cette r\u00e8gle soit active \u00e7a fonctionne n\u00e9anmoins. (\u00e0 voir).<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>POUR DEBUGGER<\/strong><\/h2>\n\n\n\n<p>Analyser le trafic sur les interfaces du serveur avec tcpdump (\u00e0 installer en root si besoin) :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk add tcpdump<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>tcpdump -i wg0<\/strong><\/pre>\n\n\n\n<p>Si vous voulez v\u00e9rifier si des paquets arrivent bien sur eth0.<\/p>\n\n\n\n<p>Utilisez tcpdump pour surveiller l&rsquo;interface eth et capturer les paquets sur le port 518** :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>tcpdump -i eth0 udp port&nbsp; 518**<\/strong><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Commandes pour WireGuard sur le serveur<\/strong><\/h2>\n\n\n\n<p>Pour voir si WireGuard est activ\u00e9 :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>wg show<\/strong><\/pre>\n\n\n\n<p>Pour activer WireGuard pour wg0 en administrateur :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>wg-quick up wg0<\/strong><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Commandes iptables<\/strong><\/h2>\n\n\n\n<p>En administrateur root :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>iptables -L -v -n<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>iptables -L -v -n | grep udp<\/strong><\/pre>\n\n\n\n<p><em>Le protocole UDP correspond au 17 dans iptables.<\/em><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>iptables -L INPUT -v -n<\/strong><\/pre>\n\n\n\n<p><em>Ces commandes affichent des informations sur les r\u00e8gles actives.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Commandes apk<\/strong><\/h2>\n\n\n\n<p>Mise \u00e0 jour :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk update<\/strong><\/pre>\n\n\n\n<p>Pour v\u00e9rifier si un paquet est install\u00e9, la command affichera son nom :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk info -e nano<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk info -e iptables<\/strong><\/pre>\n\n\n\n<p>Installer un paquet :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>apk add tcpdump<\/strong><\/pre>\n\n\n\n<p><em>Mise \u00e0 jour le 10\/11\/2024<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Configurer le lancement automatique de WireGuard<\/h2>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/index.php\/lancement-automatique-de-wireguard-au-demarrage-dun-serveur-sous-alpinelinux\/\" data-type=\"page\" data-id=\"1506\" target=\"_blank\" rel=\"noreferrer noopener\">Lancement automatique de WireGuard au d\u00e9marrage d\u2019un serveur sous AlpineLinux<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Fichier sur le client sous Linux Mint<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>sudo nano \/etc\/wireguard\/wg2.conf<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f2e7cc\"><code>&#91;Interface]\n\n# Cl\u00e9 priv\u00e9e du client\n\nPrivateKey = 8G*********************************************Gg=\n\n# Adresse IP du client \u00e0 l\u2019int\u00e9rieur du VPN\n\nAddress = 10.5.0.3\/24\n\n&#91;Peer]\n\n# Cl\u00e9 publique du serveur\n\nPublicKey = bP*********************************************HQ=\n\nAllowedIPs = 192.168.1.0\/24, 192.168.2.0\/24, 10.5.0.0\/24\n\nEndpoint = <em>IP_Publique_Serveur<\/em>:518**<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Dans notre exemple les r\u00e9seaux IP <strong>192.168.1.0\/24<\/strong> et <strong>192.168.2.0\/24<\/strong> se trouvant sur le site du serveur sont accessibles.  Le r\u00e9seau IP <strong>10.5.0.0\/24<\/strong> est celui de notre VPN.<\/em><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Clients VPN WireGuard<\/h2>\n\n\n\n<p>Installation du client pour VPN WireGuard sous Linux Mint :<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/index.php\/installer-wireguard-vpn-client-sur-linux-mint\/\" data-type=\"page\" data-id=\"1466\" target=\"_blank\" rel=\"noreferrer noopener\">Installer WireGuard VPN Client sur Linux Mint<\/a><\/p>\n\n\n\n<p>Installation du client pour VPN WireGuard sous Windows 11 :<\/p>\n\n\n\n<p>I<a href=\"https:\/\/artheodoc.fr\/index.php\/installer-et-configurer-le-client-wireguard-sous-windows-11\/\" data-type=\"page\" data-id=\"1485\" target=\"_blank\" rel=\"noreferrer noopener\">nstaller et configurer le client WireGuard sous Windows 11<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">\u00c0 voir \u00e9galement<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/index.php\/installation-et-configuration-de-wireguard-dans-home-assistant\/\" target=\"_blank\" rel=\"noreferrer noopener\">Installation et configuration de WireGuard dans Home Assistant<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cette proc\u00e9dure a \u00e9t\u00e9 cr\u00e9\u00e9e dans la cadre de l&rsquo;association Niortaise M\u00e9moire Vive. Si vous avez des suggestions pour l&rsquo;am\u00e9liorer n&rsquo;h\u00e9sitez pas \u00e0 me contacter. Dominique Renaudeau Param\u00e8tres de mon serveur sous Alpine Linux IP 192.168.1.*** (fixe) &#8211; Port SSH : 22** Box Ajout d\u2019un transfert de port UDP dans la box : port 518** [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1392","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/comments?post=1392"}],"version-history":[{"count":40,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1392\/revisions"}],"predecessor-version":[{"id":2917,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1392\/revisions\/2917"}],"wp:attachment":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/media?parent=1392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}