To successfully route traffic to your VPN server, follow these requirements:
: sudo wg show (This displays active peers and data transfer). ### Security Best Practices 51820 rar
Once configured, the service is managed via the wg-quick tool: : sudo systemctl start wg-quick@wg0 Enable on boot : sudo systemctl enable wg-quick@wg0 To successfully route traffic to your VPN server,
: Enable the kernel to pass traffic between interfaces by adding net.ipv4.ip_forward=1 to /etc/sysctl.conf . ### Service Management : Access your router's settings
: Ensure your server has a reserved local IP so the port forward doesn't break after a reboot. ### Service Management
: Access your router's settings and forward External Port 51820 (UDP) to the Internal IP of your server.
Unlike many other VPNs that use TCP, WireGuard strictly uses . If you do not explicitly allow UDP traffic, the connection will fail without an error message because WireGuard is designed to be "silent" and not respond to unauthorized packets. ## Network Setup Steps