hwdsl2 / wireguard-install

WireGuard VPN server installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS, Fedora, openSUSE and Raspberry Pi OS
MIT License
1.18k stars 275 forks source link
bash centos debian encryption linux network raspberry-pi security shell ubuntu vpn vpn-client vpn-server wireguard

English | 中文 | Video en Español

WireGuard VPN Server Auto Setup Script

Build Status  License: MIT

WireGuard VPN server installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS, Fedora, openSUSE and Raspberry Pi OS.

This script will let you set up your own VPN server in just a few minutes, even if you haven't used WireGuard before. WireGuard is a fast and modern VPN designed with the goals of ease of use and high performance.

See also: OpenVPN and IPsec VPN server auto setup scripts.

» :book: Book: Build Your Own VPN Server [English | 中文 | ES | DE | FR | IT | PT | JA]

Features

Installation

First, download the script on your Linux server*:

wget -O wireguard.sh https://get.vpnsetup.net/wg

* A cloud server, virtual private server (VPS) or dedicated server.

Option 1: Auto install WireGuard using default options.

sudo bash wireguard.sh --auto
See the script in action (terminal recording). **Note:** This recording is for demo purposes only.

For servers with an external firewall (e.g. EC2/GCE), open UDP port 51820 for the VPN.

Option 2: Interactive install using custom options.

sudo bash wireguard.sh

You can customize the following options: VPN server's DNS name, UDP port, DNS server for VPN clients and name of the first client.

For servers with an external firewall, open your selected UDP port for the VPN.

Click here if you are unable to download. You may also use `curl` to download: ```bash curl -fL -o wireguard.sh https://get.vpnsetup.net/wg ``` Then follow the instructions above to install. Alternative setup URLs: ```bash https://github.com/hwdsl2/wireguard-install/raw/master/wireguard-install.sh https://gitlab.com/hwdsl2/wireguard-install/-/raw/master/wireguard-install.sh ``` If you are unable to download, open [wireguard-install.sh](wireguard-install.sh), then click the `Raw` button on the right. Press `Ctrl/Cmd+A` to select all, `Ctrl/Cmd+C` to copy, then paste into your favorite editor.
Advanced: Auto install using custom options. Advanced users can auto install WireGuard using custom options, by specifying command-line options when running the script. For more details, see the next section "view usage information for the WireGuard script". Alternatively, you may provide a Bash "here document" as input to the setup script. This method can also be used to provide input to manage users after install. First, install WireGuard interactively using custom options, and write down all your inputs to the script. ```bash sudo bash wireguard.sh ``` If you need to remove WireGuard, run the script again and select the appropriate option. Next, create the custom install command using your inputs. Example: ```bash sudo bash wireguard.sh <
View usage information for the WireGuard script. ``` Usage: bash wireguard.sh [options] Options: --addclient [client name] add a new client --dns1 [DNS server IP] primary DNS server for new client (optional, default: Google Public DNS) --dns2 [DNS server IP] secondary DNS server for new client (optional) --listclients list the names of existing clients --removeclient [client name] remove an existing client --showclientqr [client name] show QR code for an existing client --uninstall remove WireGuard and delete all configuration -y, --yes assume "yes" as answer to prompts when removing a client or removing WireGuard -h, --help show this help message and exit Install options (optional): --auto auto install WireGuard using default or custom options --serveraddr [DNS name or IP] server address, must be a fully qualified domain name (FQDN) or an IPv4 address --port [number] port for WireGuard (1-65535, default: 51820) --clientname [client name] name for the first WireGuard client (default: client) --dns1 [DNS server IP] primary DNS server for first client (default: Google Public DNS) --dns2 [DNS server IP] secondary DNS server for first client To customize options, you may also run this script without arguments. ```

Next steps

After setup, you can run the script again to manage users or uninstall WireGuard.

Get your computer or device to use the VPN. Please refer to:

Configure WireGuard VPN Clients

Read :book: VPN book to access extra content.

Enjoy your very own VPN! :sparkles::tada::rocket::sparkles:

Credits

This script is based on the great work of Nyr and contributors, with enhancements and changes for compatibility with the Setup IPsec VPN project.

List of enhancements over Nyr/wireguard-install. - Improved compatibility with Setup IPsec VPN - Improved script reliability, user input and output - Supports auto install using default or custom options - Supports using a DNS name as server address - Added support for openSUSE Linux - Supports listing existing VPN clients - Supports showing QR code for a client - Supports custom DNS server(s) for VPN clients - Supports command-line options for managing VPN clients - Optimizes `sysctl` settings for improved VPN performance - Improved creation of client config files when using `sudo` ...and more!

License

MIT