From baac77ad079329b63ef5ec84b166614fee7b02c5 Mon Sep 17 00:00:00 2001 From: Michael Date: Tue, 9 Jul 2019 22:57:55 +0200 Subject: [PATCH] Update wireguard-s2s.rst (#183) --- source/manual/how-tos/wireguard-s2s.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/source/manual/how-tos/wireguard-s2s.rst b/source/manual/how-tos/wireguard-s2s.rst index 9c097889..0fd6b26a 100644 --- a/source/manual/how-tos/wireguard-s2s.rst +++ b/source/manual/how-tos/wireguard-s2s.rst @@ -39,7 +39,7 @@ key and give it to the other side. When this VPN is set up on OPNsense only do the same on the second machine and exchange the public keys. Now go to tab **Endpoints** and add the remote site, give it a **Name**, insert the **Public -Key** and the **Tunnel Address** (e.g. 192.168.0.2/24). **Endpoint Address** is the public IP of the +Key** and the **Allowed IPs** (e.g. 192.168.0.2/24, 10.10.10.0/24). **Endpoint Address** is the public IP of the remote site and you can also set optionally the **Endpoint Port**, now hit **Save changes**. Go back to tab **Local**, open the instance and choose the newly created endpoint in **Peers**. @@ -60,7 +60,7 @@ Your tunnel is now up and running. Step 4 - Routing networks ------------------------- -If you want to route your internal networks via this VPN just add the network in the -**Tunnel Address** in **Endpoints** tab (e.g. 10.0.1.0/24). +If you want to route your internal networks via this VPN just add the network in the field +**Allowed IPs** in **Endpoints** tab (e.g. 10.0.1.0/24). That's it!