Champlain College Classes
HomeTech JournalsPersonal ProjectsSysadmin Wiki
SEC-440: Systems Security
SEC-440: Systems Security
  • SEC-440: Systems Security
  • Breakdown
    • Course Overview
  • Labs
    • Project 1 - Network Redundancy
    • Project 2 - Web and Proxy Redundancy
    • Project 3 - Web Application and Database Redundancy
    • Project 4 - AWS
    • Project 5 - Wireguard with AWS
    • Project 6 - Federated Identity
    • Project 7 - Windows Admin Center
    • Project 8 - Kerberos - Deep Dive
  • Notes
    • Page 2
Powered by GitBook
On this page
  • Setup Instance
  • Setup Wiregaurd
  1. Labs

Project 5 - Wireguard with AWS

PreviousProject 4 - AWSNextProject 6 - Federated Identity

Last updated 1 year ago

Setup Instance

Boot up learner lab

Launch new instance

Select Ubuntu 22.04

Make new keypair

Edit Security group

Start instance

Setup Wiregaurd

Now download key to xubuntu-lan

Open Terminal and connect to instance

Install wireguard:

Sudo apt-get update

Sudo apt-get install wireguard

Wiregaurd Server Configuration

Wiregaurd xUbuntu Configuration

Add to config

PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o ens162 -j MASQUERADE

PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o ens162 -j MASQUERADE

Then type

sysctl -w net.ipv4.ip_forward=1

sysctl -p

Activate Wiregaurd

systemctl restart wg-quick@wg0.service

Showing connectivity

Connecting to test page over arbitrary port

Connecting to webpage: