For clients to use WireGuard it must first be enabled and configured on the server. Once the server and client have WireGuard configured a OVPN
and WG
button will be shown when connecting on the client to select the protocol. The server must allow the client to access the HTTPS port to allow WireGuard connections to be authenticated.


Once WireGuard is separately installed the connect button will display OVPN and WG buttons to select the connection type. If the button is not shown the client did not detect the WireGuard installation.
Linux Client
WireGuard must be separately installed on the client. The wireguard-tools
and wireguard-dkms
packages are required. Use the command sudo dkms status
to verify the DKMS module is available. If sudo dkms status
does not show the module with the current kernel version restart the server and run sudo dkms autoinstall
.
sudo curl -o /etc/yum.repos.d/jdoss-wireguard-epel-7.repo https://copr.fedorainfracloud.org/coprs/jdoss/wireguard/repo/epel-7/jdoss-wireguard-epel-7.repo
sudo yum -y install kernel-devel kernel-uek-devel wireguard-dkms wireguard-tools
sudo dkms autoinstall
sudo dkms status
sudo reboot
Using WireGuard on Ubuntu may require the resolvconf
package.
Windows Client
The WireGuard Windows package must be installed separately.
macOS Client
The Homebrew packages bash
and wireguard-tools
must be separately installed.
Updated 8 months ago