[SOLVED] PBS & Wireguard

dirkschwarz

Member
Jun 21, 2020
28
1
8
62
Guten Morgen,

würde gerne einen räumlich getrennten, über Wireguard verbundenen PBS aufsetzen. Ich scheitere aber an der Installation von Wireguard.

Bei meinen ProxmoxVE- Maschinen bin ich nach folgender Anleitung vorgegangen Wireguard PVE - klappt prima und ohne Probleme. Versuche ich dies aber auf einem Backup-Server findet er die "pve-headers" nicht und kann Wireguard nicht installieren.

Hoffe Ihr habt eine Lösung :)
 
Bash:
deb http://ftp.de.debian.org/debian buster main contrib

deb http://ftp.de.debian.org/debian buster-updates main contrib

# security updates
deb http://security.debian.org buster/updates main contrib

# PBS pbs-no-subscription repository provided by proxmox.com,
# NOT recommended for production use
deb http://download.proxmox.com/debian/pbs buster pbs-no-subscription

# Backports
deb http://deb.debian.org/debian buster-backports main contrib non-free
 
Sieht gut aus, installation der pve-headers ist hier möglich.

> apt update
> apt install pve-headers-5.4
 
hat geklappt :) - wen`s interessiert....:

Markdown (GitHub flavored):
### Sources-List ###

```
deb http://ftp.de.debian.org/debian buster main contrib

deb http://ftp.de.debian.org/debian buster-updates main contrib

# security updates
deb http://security.debian.org buster/updates main contrib

# PBS pbs-no-subscription repository provided by proxmox.com,
# NOT recommended for production use
deb http://download.proxmox.com/debian/pbs buster pbs-no-subscription

# Backports
deb http://deb.debian.org/debian buster-backports main contrib non-free
```

### Installation ###

`apt update`

`apt install pve-headers-5.4`

`apt install wireguard wireguard-dkms wireguard-tools`

`nano /etc/wireguard/wg0.conf`

```
[Interface]
Address = 10.10.10.6/32
ListenPort = 46623
PrivateKey = xyz
DNS = 1.1.1.1

PostUp = iptables -A FORWARD -i wg-home -j ACCEPT; iptables -t nat -A POSTROUTING -o ens33 -j MASQUERADE;
PostDown = iptables -D FORWARD -i wg-home -j ACCEPT; iptables -t nat -D POSTROUTING -o ens33 -j MASQUERADE;

[Peer]
AllowedIPs = x.x.x.x/x
Endpoint = x.x.x.x:51820
PersistentKeepalive = 25
PublicKey = xyz
```
`wg-quick up wg0`

`systemctl enable  wg-quick@wg0`
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!