IPv64.net WireGuard Config Generator
The data traffic for the CDN domains is forwarded via these servers.
These servers are secured against external attacks.
WireGuard Config Generator
This tool helps you create configuration files for a WireGuard "Client - Server" setup where you have one server and a number of clients. Simply enter the parameters for your customized setup and click “Generate Config” to get started.
[Interface]
Address = 172.31.0.1/24
ListenPort = 51820
PrivateKey = ylmoFFvUBAHPng4pNg7SoxFwq63cyM8gY53JCWnZNN4=
[Peer]
PublicKey = 8Qr6zEVoUB05DbcFyVrRfGVQvy+qkE3rvBW4FBp1YWE=
AllowedIPs = 172.31.0.2/32
[Peer]
PublicKey = fA6sVtO4Ed5NvnqOwaA4y9BDYVSBMrsVs1VorsDZiXo=
AllowedIPs = 172.31.0.3/32
[Peer]
PublicKey = AKxSRfVfaipFQxfkaIxEMlW63MXs+5XGbr85JdvvED0=
AllowedIPs = 172.31.0.4/32
[Peer]
PublicKey = pdMINv4TpjOKiOvqcYy/bpxvF/7vpcUeBO/fsZxcoXw=
AllowedIPs = 172.31.0.5/32
[Peer]
PublicKey = HzqNE3KV95NMKdC1n9XlUGFg3Fv/o8x06Uh8jxjdSHU=
AllowedIPs = 172.31.0.6/32
[Interface]
Address = 172.31.0.2/24
PrivateKey = ibcL+CzTrZjGYCoPrOefZMbdhshPbooWpCmuMQ8Ay80=
[Peer]
PublicKey = axlWZ+3qUYCdkOUyAmm3ywmnr832IHZdImfw5gnRmHc=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = hostname.ipv64.net:51820
[Interface]
Address = 172.31.0.3/24
PrivateKey = obEDFSIpGODgpYxhZ++2gc5UbSagbfB06GCnbgsNaYE=
[Peer]
PublicKey = axlWZ+3qUYCdkOUyAmm3ywmnr832IHZdImfw5gnRmHc=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = hostname.ipv64.net:51820
[Interface]
Address = 172.31.0.4/24
PrivateKey = 1oZ69IbCPKjLVkJV/UOGp22EcTtFZNWwGpitGMldtPs=
[Peer]
PublicKey = axlWZ+3qUYCdkOUyAmm3ywmnr832IHZdImfw5gnRmHc=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = hostname.ipv64.net:51820
[Interface]
Address = 172.31.0.5/24
PrivateKey = mt0SP+upQflFYlxSTJEbtMLDAKx3cyKdw1UpGdpa7xc=
[Peer]
PublicKey = axlWZ+3qUYCdkOUyAmm3ywmnr832IHZdImfw5gnRmHc=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = hostname.ipv64.net:51820
[Interface]
Address = 172.31.0.6/24
PrivateKey = O9hVTJFCGsJMqkKgxQpxzQpSO9kzXgkoupHWkuKizLc=
[Peer]
PublicKey = axlWZ+3qUYCdkOUyAmm3ywmnr832IHZdImfw5gnRmHc=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = hostname.ipv64.net:51820
With the IPv64 Cloud Router, you can establish secure connections to clients, sites, sites to sites, and customers without any major administrative effort. The Cloud Router serves as a connection interface and can be accessed via WireGuard.
This cloud service also automatically takes care of assigning IP addresses in the network. This tool also helps you overcome annoying IPv6 barriers.
sudo apt install wireguardsudo nano /etc/wireguard/wg0.confsudo wg-quick up wg0sudo systemctl enable wg-quick@wg0Click on connectWireGuard is a modern and lightweight VPN protocol designed for maximum security and speed. It utilizes cutting-edge cryptography (e.g., ChaCha20 for encryption) and is far more efficient than traditional VPNs like OpenVPN or IPsec.
With its minimal codebase (only a few thousand lines), WireGuard reduces the risk of security vulnerabilities while delivering high performance, even on mobile devices. Its static peering model enables fast connections and easy setup, while built-in roaming support ensures stable connectivity across different networks.
All keys, QR codes and configuration files are generated in the FrontEnd, our servers do not store anything.
| MINISFORUM MS-01 Homelab Server 779,99 € Show me |
The data traffic for the CDN domains is forwarded via these servers.
These servers are secured against external attacks.