{"id":1466,"date":"2024-11-09T14:23:24","date_gmt":"2024-11-09T13:23:24","guid":{"rendered":"https:\/\/artheodoc.fr\/?page_id=1466"},"modified":"2024-11-10T13:50:22","modified_gmt":"2024-11-10T12:50:22","slug":"installer-wireguard-vpn-client-sur-linux-mint","status":"publish","type":"page","link":"https:\/\/artheodoc.fr\/index.php\/installer-wireguard-vpn-client-sur-linux-mint\/","title":{"rendered":"Installer WireGuard VPN Client sur Linux Mint"},"content":{"rendered":"\n<p><br><em>Linux Mint 21.1 64-bit<\/em><\/p>\n\n\n\n<p class=\"has-pale-ocean-gradient-background has-background\">Dans ce tutoriel, je vais vous montrer comment configurer un client WireGuard sous Linux Mint pour un VPN SSL client-to-site. Cela permet d&rsquo;acc\u00e9der \u00e0 un r\u00e9seau local \u00e0 distance.<\/p>\n\n\n\n<p>Sources : <a href=\"https:\/\/serverspace.io\/support\/help\/how-to-install-wireguard-vpn-client-on-ubuntu-linux\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/serverspace.io\/support\/help\/how-to-install-wireguard-vpn-client-on-ubuntu-linux\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p>Installation de l&rsquo;application client WireGuard sur Linux Mint :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>sudo apt-get install wireguard<\/strong><\/pre>\n\n\n\n<p>G\u00e9n\u00e9rer une paire de cl\u00e9s client publique et priv\u00e9e (dans le dossier courant) en ex\u00e9cutant la commande suivante :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>wg genkey | tee private.key | wg pubkey &gt; public.key<\/strong><\/pre>\n\n\n\n<p>La cl\u00e9 priv\u00e9e :<\/p>\n\n\n\n<p>8G**********************************************Gg=<\/p>\n\n\n\n<p>La cl\u00e9 publique :<\/p>\n\n\n\n<p>sR**********************************************Ak=<\/p>\n\n\n\n<p><em>On peut faire un <strong>cat <\/strong>des fichiers pour visualiser les cl\u00e9s.<\/em><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Exemple de fichier de configuration wg<em>x<\/em>.conf<\/strong><\/p>\n\n\n\n<p><em>Apr\u00e8s cela, cr\u00e9er un fichier de configuration client (<strong>wg2.conf<\/strong> dans mon cas), dans le r\u00e9pertoire suivant :<\/em><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><em><strong>sudo nano \/etc\/wireguard\/wg<\/strong><\/em><em><strong>2<\/strong><\/em><em><strong>.conf<\/strong><\/em><\/pre>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f2e7cc\"><code>&#91;Interface]\n\n# Cl\u00e9 priv\u00e9e du client\n\nPrivateKey = 8G*****************************************Gg=\n\n# Adresse IP du client \u00e0 l\u2019int\u00e9rieur du VPN\n\nAddress = 10.5.0.3\/24\n\n&#91;Peer]\n\n# Cl\u00e9 publique du serveur\n\nPublicKey = bP*****************************************HQ=\n\nAllowedIPs = 192.168.1.0\/24, 192.168.2.0\/24, 10.5.0.0\/24\n\nEndpoint = <em>IP_Publique_Serveur<\/em>:518**<\/code><\/pre>\n\n\n\n<p><code>Explications :<\/code><\/p>\n\n\n\n<p><code><strong>[Interface]<\/strong> : Contient les param\u00e8tres de l\u2019interface Wiregard sur le client.<\/code><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>PrivateKey : La cl\u00e9 priv\u00e9e de mon client.<\/code><\/li>\n\n\n\n<li><code>Address : Mon adresse IP pour le VPN (unique, transmise par l\u2019administrateur du serveur VPN).<\/code><\/li>\n<\/ul>\n\n\n\n<p><code><strong>[Peer]<\/strong> : Contient les param\u00e8tres pour le serveur.<\/code><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>PublicKey : Cl\u00e9 publique du serveur VPN (transmise par l\u2019administrateur du serveur VPN).<\/code><\/li>\n\n\n\n<li><code>AllowedIPs : Les r\u00e9seaux IP accessibles depuis le VPN <\/code><code>(<\/code><code>r\u00e9seau local, serveurs derri\u00e8re le pare-feu, r\u00e9seau propre au VPN).<\/code><\/li>\n\n\n\n<li><code>Endpoint : IP publique de la box en IPV4 et port pour le VPN<\/code>.<\/li>\n\n\n\n<li><code>Dans notre exemple les r\u00e9seaux IP 192.168.1.0\/24 et 192.168.2.0\/24 se trouvant sur le site du serveur sont accessibles. Le r\u00e9seau IP 10.5.0.0\/24 est celui de notre VPN.<\/code><\/li>\n<\/ul>\n\n\n\n<p>Ma cl\u00e9 priv\u00e9e que l\u2019on doit mettre dans le fichier de configuration peut \u00eatre visualis\u00e9e avec la commande :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>cat private.key<\/strong><\/pre>\n\n\n\n<p>Ma cl\u00e9 publique (\u00e0 transmettre pour la configuration serveur) peut \u00eatre visualis\u00e9e avec la commande :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>cat public.key<\/strong><\/pre>\n\n\n\n<p class=\"has-medium-font-size\"><strong>D\u00e9marrer WireGuard<\/strong><\/p>\n\n\n\n<p>Pour d\u00e9marrer la connexion, tapez la commande suivante :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>sudo wg-quick up wg2<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;#] ip link add wg2 type wireguard\n\n&#91;#] wg setconf wg2 \/dev\/fd\/63\n\n&#91;#] ip -4 address add 10.5.0.3\/24 dev wg2\n\n&#91;#] ip link set mtu 1420 up dev wg2\n\n&#91;#] ip -4 route add 192.168.2.0\/24 dev wg2\n\n&#91;#] ip -4 route add 192.168.1.0\/24 dev wg2<\/code><\/pre>\n\n\n\n<p>Maintenant le client peut communiquer avec le serveur, vous pouvez faire un ping du serveur \u00e0 partir du client avec la commande :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>ping 10.5.0.1<\/strong><\/pre>\n\n\n\n<p>Pour conna\u00eetre l&rsquo;\u00e9tat de connexion, ex\u00e9cutez la commande suivante :<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>sudo wg show<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>endpoint: ***.***.***.***:518**\n\nallowed ips: 192.168.1.0\/24, 192.168.2.0\/24, 10.5.0.0\/24\n\nlatest handshake: 2 minutes, 58 seconds ago\n\ntransfer: 476 B received, 564 B sent<\/code><\/pre>\n\n\n\n<p>D\u00e9monter l\u2019interface de Wireguard&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>sudo wg-quick down wg2<\/strong><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;#] ip link delete dev wg2<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-pale-ocean-gradient-background has-background\"><em>Le VPN vous permet d\u2019avoir un acc\u00e8s sur le r\u00e9seau local comme si vous \u00e9tiez sur place.<\/em><\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u00c0 voir \u00e9galement<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/index.php\/installer-et-configurer-le-client-wireguard-sous-windows-11\/\" data-type=\"page\" data-id=\"1485\" target=\"_blank\" rel=\"noreferrer noopener\">Installer et configurer le client WireGuard sous Windows 11<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux Mint 21.1 64-bit Dans ce tutoriel, je vais vous montrer comment configurer un client WireGuard sous Linux Mint pour un VPN SSL client-to-site. Cela permet d&rsquo;acc\u00e9der \u00e0 un r\u00e9seau local \u00e0 distance. Sources : https:\/\/serverspace.io\/support\/help\/how-to-install-wireguard-vpn-client-on-ubuntu-linux\/ Installation de l&rsquo;application client WireGuard sur Linux Mint : sudo apt-get install wireguard G\u00e9n\u00e9rer une paire de cl\u00e9s client [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1466","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/comments?post=1466"}],"version-history":[{"count":8,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1466\/revisions"}],"predecessor-version":[{"id":1521,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1466\/revisions\/1521"}],"wp:attachment":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/media?parent=1466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}