diff --git a/source/manual/how-tos/wireguard-s2s.rst b/source/manual/how-tos/wireguard-s2s.rst index 9c097889..0fd6b26a 100644 --- a/source/manual/how-tos/wireguard-s2s.rst +++ b/source/manual/how-tos/wireguard-s2s.rst @@ -39,7 +39,7 @@ key and give it to the other side. When this VPN is set up on OPNsense only do the same on the second machine and exchange the public keys. Now go to tab **Endpoints** and add the remote site, give it a **Name**, insert the **Public -Key** and the **Tunnel Address** (e.g. 192.168.0.2/24). **Endpoint Address** is the public IP of the +Key** and the **Allowed IPs** (e.g. 192.168.0.2/24, 10.10.10.0/24). **Endpoint Address** is the public IP of the remote site and you can also set optionally the **Endpoint Port**, now hit **Save changes**. Go back to tab **Local**, open the instance and choose the newly created endpoint in **Peers**. @@ -60,7 +60,7 @@ Your tunnel is now up and running. Step 4 - Routing networks ------------------------- -If you want to route your internal networks via this VPN just add the network in the -**Tunnel Address** in **Endpoints** tab (e.g. 10.0.1.0/24). +If you want to route your internal networks via this VPN just add the network in the field +**Allowed IPs** in **Endpoints** tab (e.g. 10.0.1.0/24). That's it!