diff --git a/nixos/common/optional/wireguard/default.nix b/nixos/common/optional/wireguard/default.nix index d124f52..714c1e4 100644 --- a/nixos/common/optional/wireguard/default.nix +++ b/nixos/common/optional/wireguard/default.nix @@ -9,7 +9,7 @@ networking = { nat = { enable = true; - externalInterface = "wlp2s0"; + externalInterface = "eno1"; internalInterfaces = [ "wg0" ]; }; wireguard.interfaces = { @@ -20,11 +20,11 @@ # This allows the wireguard server to route your traffic to the internet and hence be like a VPN # For this to work you have to set the dnsserver IP of your router (or dnsserver of choice) in your clients postSetup = '' - ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -s 10.100.0.0/24 -o wlp2s0 -j MASQUERADE + ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -s 10.100.0.0/24 -o eno1 -j MASQUERADE ''; # This undoes the above command postShutdown = '' - ${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -s 10.100.0.0/24 -o wlp2s0 -j MASQUERADE + ${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -s 10.100.0.0/24 -o eno1 -j MASQUERADE ''; # Path to the private key file. privateKeyFile = config.age.secrets.wireguard.path;