Adjust networking to allow Wireguard client to work properly
This commit is contained in:
parent
3f8c8df90a
commit
a06273419c
1 changed files with 18 additions and 1 deletions
|
@ -176,7 +176,24 @@
|
||||||
|
|
||||||
# For xdebug...verify actual necessity
|
# For xdebug...verify actual necessity
|
||||||
# Have had to use this, but I think it can be disabled still - perhaps w/xdebug binding setting...don't know.
|
# Have had to use this, but I think it can be disabled still - perhaps w/xdebug binding setting...don't know.
|
||||||
networking.firewall.allowedTCPPorts = [ 9003 ];
|
#networking.firewall.allowedTCPPorts = [ 9003 ];
|
||||||
|
|
||||||
|
networking.firewall = {
|
||||||
|
allowedTCPPorts = [ 9003 ];
|
||||||
|
allowedUDPPorts = [ 51820 ];
|
||||||
|
# if packets are still dropped, they will show up in dmesg
|
||||||
|
logReversePathDrops = true;
|
||||||
|
checkReversePath = "loose";
|
||||||
|
# wireguard trips rpfilter up
|
||||||
|
#extraCommands = ''
|
||||||
|
# ip46tables -t mangle -I nixos-fw-rpfilter -p udp -m udp --sport 51820 -j RETURN
|
||||||
|
# ip46tables -t mangle -I nixos-fw-rpfilter -p udp -m udp --dport 51820 -j RETURN
|
||||||
|
#'';
|
||||||
|
#extraStopCommands = ''
|
||||||
|
# ip46tables -t mangle -D nixos-fw-rpfilter -p udp -m udp --sport 51820 -j RETURN || true
|
||||||
|
# ip46tables -t mangle -D nixos-fw-rpfilter -p udp -m udp --dport 51820 -j RETURN || true
|
||||||
|
#'';
|
||||||
|
};
|
||||||
# Allow unfree packages
|
# Allow unfree packages
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue