Compare commits

...

2 Commits

Author SHA1 Message Date
68d7c22549
Switch to the operator LAN subnet 2025-03-04 17:51:30 +01:00
acf5a23ed5
Remove SSH upload configuration file 2025-03-04 17:50:54 +01:00
2 changed files with 8 additions and 4 deletions

View File

@ -1 +0,0 @@
((nil . ((ssh-deploy-root-remote . "/ssh:zion:/home/coolneng/system"))))

View File

@ -24,7 +24,7 @@ in
systemd.network.networks."24-home" = { systemd.network.networks."24-home" = {
name = "enp2s0"; name = "enp2s0";
matchConfig.Name = "enp2s0"; matchConfig.Name = "enp2s0";
address = [ "192.168.129.2/23" ]; address = [ "192.168.128.2/23" ];
gateway = [ "192.168.128.1" ]; gateway = [ "192.168.128.1" ];
dns = [ dns = [
"1.1.1.1" "1.1.1.1"
@ -56,6 +56,11 @@ in
wireguard_port # Wireguard wireguard_port # Wireguard
53 # DNS 53 # DNS
]; ];
extraCommands = ''
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o ${
config.systemd.network.networks."24-home".name
} -j MASQUERADE
'';
}; };
# Wireguard setup # Wireguard setup
@ -104,7 +109,7 @@ in
listen-address = [ listen-address = [
"127.0.0.1" "127.0.0.1"
"192.168.129.2" "192.168.128.2"
"10.8.0.1" "10.8.0.1"
]; ];
bind-interfaces = true; bind-interfaces = true;
@ -116,7 +121,7 @@ in
conf-file = "${pkgs.dnsmasq}/share/dnsmasq/trust-anchors.conf"; conf-file = "${pkgs.dnsmasq}/share/dnsmasq/trust-anchors.conf";
dnssec = false; dnssec = false;
address = "/coolneng.duckdns.org/192.168.129.2"; address = "/coolneng.duckdns.org/192.168.128.2";
}; };
}; };