diff --git a/configurations/camelot/wireguard.nix b/configurations/camelot/wireguard.nix index 6445769..1d48ee8 100644 --- a/configurations/camelot/wireguard.nix +++ b/configurations/camelot/wireguard.nix @@ -6,7 +6,7 @@ /* Wireguard */ networking.wireguard.interfaces.wg0 = { - ips = [ "10.100.0.6/24" ]; + ips = [ "10.100.0.6/8" ]; listenPort = 51820; privateKeyFile = config.sops.secrets.wg0_private.path; @@ -41,7 +41,7 @@ }; networking.wireguard.interfaces.wg1 = { - ips = [ "10.100.1.1" ]; + ips = [ "10.100.1.1/8" ]; listenPort = 51821; privateKeyFile = config.sops.secrets.wg1_private.path; interfaceNamespace = "wg1ns"; diff --git a/configurations/london/default.nix b/configurations/london/default.nix index 95ad268..25ca7e9 100644 --- a/configurations/london/default.nix +++ b/configurations/london/default.nix @@ -73,7 +73,7 @@ /* Wireguard */ networking.wg-quick.interfaces.wg0 = { - address = [ "10.100.0.4/24" ]; + address = [ "10.100.0.4/8" ]; dns = [ "10.100.0.1" ]; listenPort = 51820; @@ -84,7 +84,7 @@ # Rock Pro 64 publicKey = "XVmG3/rNsCqc8KCmOx3+UUn9DJOnJ40Uxid5JGdChR4="; endpoint = "${extraInfo.wireguard.rockProEndpoint}:51820"; - allowedIPs = [ "10.100.0.1" ]; + allowedIPs = [ "10.100.0.1/8" ]; persistentKeepalive = 25; } @@ -92,7 +92,7 @@ # VPS publicKey = "x45YsLDpMJw1pwKOvkyzdesen3lFcKpxCXACGz+xtDs="; endpoint = "${extraInfo.wireguard.VPSEndpoint}:51820"; - allowedIPs = [ "10.100.0.2" ]; + allowedIPs = [ "10.100.0.2/8" ]; persistentKeepalive = 25; } ];