From 6c2ff7d9d3fdcc0c3354015ed6d2a54ba9670a52 Mon Sep 17 00:00:00 2001 From: Michael Date: Sun, 21 Jul 2019 13:54:44 +0200 Subject: [PATCH] Update wireguard-s2s.rst (#185) --- source/manual/how-tos/wireguard-s2s.rst | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/source/manual/how-tos/wireguard-s2s.rst b/source/manual/how-tos/wireguard-s2s.rst index aa1b8726..0d5bfff2 100644 --- a/source/manual/how-tos/wireguard-s2s.rst +++ b/source/manual/how-tos/wireguard-s2s.rst @@ -33,8 +33,10 @@ key and give it to the other side. When this VPN is set up on OPNsense only do the same on the second machine and exchange the public keys. Now go to tab **Endpoints** and add the remote site, give it a **Name**, insert the **Public -Key** and the **Allowed IPs** (e.g. 192.168.0.2/24, 10.10.10.0/24). **Endpoint Address** is the public IP of the -remote site and you can also set optionally the **Endpoint Port**, now hit **Save changes**. +Key** and the **Allowed IPs** e.g. *192.168.0.2/32, 10.10.10.0/24*. This will set the remonte tunnel +IP address (/32 is important when using multiple endpoints) and route 10.10.10.0/24 via the tunnel. +**Endpoint Address** is the public IP of the remote site and you can also set optionally the +**Endpoint Port**, now hit **Save changes**. Go back to tab **Local**, open the instance and choose the newly created endpoint in **Peers**.