Wireguard is a new, light-weight VPN that is both faster and simpler than its predecessors. With a small code-base and modern cryptography, it’s the future of VPNs.
Wireguard is a layer 3 VPN and as such, only works with IPv4/6. It doesn’t provide DHCP, bridging, or other low-level features.
Participants authenticate using public-key cryptography, use UDP as a transport and do not respond to unauthenticated connection attempts.
Every participant is considered a peer. Each defines their own IP address, routing rules, and decides from whom they will accept traffic. Every peer must exchange public keys with every other other peer. There is no central authority.
Traffic is sent directly between configured peers but can also be relayed through central nodes if so configured by routing rules on the participants.
The way you deploy depends on what you’re doing, but in general you’ll either connect directly point-to-point or create a central server for remote access or management.
Central Server and Remote Access
This is the classic setup where remote systems connect to the network through one central point. Configure a wireguard server as that central point and then your clients (remote peers) to connect.
Central Server and Remote Management
Another common use is to have a fleet of devices ‘phone-home’ so you can reach them easily.
Point to Point
You can also have peers talk directly to each other. This is often used with routers to connect networks across the internet.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.