# Sample WireGuard Server Configuration # This is the configuration for the WireGuard VPN server # that football systems will connect to. # # Usage: Copy this to /etc/wireguard/wg0.conf on the VPN server # and adjust as needed for your environment. [Interface] # Private key of the VPN server # Generate with: wg genkey PrivateKey = # VPN network address (this server) Address = 10.100.0.1/24 # Port to listen on (UDP) ListenPort = 51820 # DNS for VPN clients DNS = 10.100.0.1 # Enable IP forwarding on the server # Add this to /etc/sysctl.conf: net.ipv4.ip_forward=1 # Then run: sysctl -p # NAT configuration (POSTROUTING) # iptables -t nat -A POSTROUTING -s 10.100.0.0/24 -o eth0 -j MASQUERADE [Peer] # Client: football-1 # Public key generated on client with: wg pubkey < client-private.key PublicKey = AllowedIPs = 10.100.0.2/32 [Peer] # Client: football-2 PublicKey = AllowedIPs = 10.100.0.3/32 [Peer] # Client: football-3 PublicKey = AllowedIPs = 10.100.0.4/32 # Add more [Peer] sections as needed for additional football clients