How to set up a simple Wireguard VPN

Install Wireguard

I’m using a Debian virtual machine for the server. In Debian 10, you’ll need to install the following two packages:

apt install wireguard-dkms wireguard-tools

Set up keys

First, navigate to /etc/wireguard (If not created, run mkdir /etc/wireguard as root) and then run the following commands as root:

wg genkey | tee laptop-private.key |  wg pubkey > laptop-public.key
wg genkey | tee server-private.key |  wg pubkey > server-public.key

The first line is for the public and private keys of the client, named laptop because, well, it’ll be used on a laptop. But you can choose any other name.

Configure the Wireguard server

First, enable IP forwarding. Since we’re only using IPv4, edit the /etc/sysctl.conf file as root, locate the net.ipv4.ip_forward line, uncomment it and change the value to 1.

Now, you need to create the /etc/wireguard/wg0.conf. This will be both the name of the connection interface and the configuration file for that interface. I’m using just one for a simple setup.

Address =
ListenPort = 51820
PrivateKey = <copy private key from server-private.key>
PostUp   = iptables -A FORWARD -i %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE

# laptop
PublicKey = <copy public key from laptop-public.key>
AllowedIPs =

Now you are ready to start the Wireguard daemon, so it can accept connections. Just run:

wg-quick up wg0

Some things to know


Address: the private IPv4 addresses (you can also use IPv6 addresses) for the Wireguard server subnet. In this example, clients connection to the server will be assigned IPs ranging from to

ListenPort: the port where Wireguard will listen. Don’t forget to open it in your firewall.

PrivateKey: the content from server-private.key.

PostUp and PostDown: defines steps to be run after the interface is turned on or off, respectively. In this case, iptables is used to set IP masquerade rules to allow all the clients to share the server’s IPv4 address. The rules will then be cleared once the tunnel is down. Don’t forget to change eth0 to your server’s network device.


PublicKey: the content from laptop-public.key.

AllowedIPs: the subnet IP assigned to that client when it connects to the server

Set up the client

On the client side, you’ll also have to install Wireguard. If you’re using Debian, Ubuntu or any distribution based on the previous two, the command will be the same (I’m assuming Ubuntu uses the same package names. If not, change it to your needs). In Arch, the distribution I’m currently using, you can install packages with:

pacman -Syuv wireguard-dkms wireguard-tools

Configure the Wireguard client

Create the /etc/wireguard/wg0.conf file and populate it with the following content:

Address =
PrivateKey = <copy private key from laptop-private.key>

PublicKey = <copy public key from server-public.key>
AllowedIPs =
Endpoint = 
PersistentKeepalive = 25

Some things to know


Addresss: the client’s IP address in Wiregard’s subnet.

PrivateKey: the content from laptop-private.key.


PublicKey: the content from server-public.key.

AllowedIPs: set it to to forward all IPv4 traffic through Wireguard.

Endpoint: the server IP address, followed by the port to connect to.

PersistentKeepalive: the number of seconds you wish the client sends a keepalive packet to the server. This is useful if the client is behind NAT or a firewall

Test the connection

On the client side, run wg-quick up wg0. You should now have a working Wireguard connection just like any VPN.

If you found a typo or an error, please use the comment box to report it. Also, if you found the post useful, please share it on social media, so it can reach a larger audience.



In the last couple of months, I’ve been using LXQT as an alternative to Plasma Desktop. Coupled with compton_tryone for the blur bling, a nice dark and transparent theme, and some GTK and Kvantum dark themes to match, it’s actually a great desktop environment.


MintBox 3 disponível

O MintBox3, o computador desenvolvido pela Compulab em parceria com o projeto Linux Mint, chegou. O equipamento está disponível em duas edições, Basic e Pro, e vem com a versão mais recente da distribuição, Linux Mint 19.3 Tricia, pré-instalada.

Esta é a quinta interação do MintBox. A estética mantém-se semelhante às versões anteriores e apresenta uma boa capacidade de processamento, para além de algumas características interessantes, como uma quantidade bastante grande de portas USB (9 na versão Basic e 10 na versão Pro).

No que toca a especificações, elas são as seguintes:


  • CPU: Intel i5 9500
  • RAM: 16GB DDR4 2666MHz
  • Disco: 256GB NVMe Samsung
  • Gráfica: Intel UHD 630
  • Rede: Dual Gbit Ethernet e WiFi 802.11ac


  • CPU: Intel i9 9900K
  • RAM: 32GB Dual channel DDR4 2666MHz
  • Disco: 1TB NVMe Samsung
  • Gráfica: Intel 630 UHD e Nvidia GeForce GTX 1660 Ti 6GB
  • Rede: Dual Gbit Ethernet e WiFi 802.11ac

A versão Basic começa nos 1399 dólares e a Pro nos 2499 dólares. Estes preços não são lá muito simpáticos mas, ainda assim, uma boa forma de apoiar o projeto Linux Mint e de conseguir utilizar o Google Chrome sem que o computador se “engasgue” muito.