-
-
Save Tailerusin/7543d4539dd0b5524d9a81685ef005d0 to your computer and use it in GitHub Desktop.
Revisions
-
Denis Gritsenko revised this gist
Sep 24, 2024 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -7,7 +7,7 @@ ``` Этап 2. Создание листа со списком сетей к которым нужно отправлять трафик. Адреса сервисов можно получить с помощью проекта [DomainMapper](https://github.com/Ground-Zerro/DomainMapper) ``` /ip/firewall/address-list -
Denis Gritsenko revised this gist
Sep 16, 2024 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -22,7 +22,7 @@ add action=mark-routing chain=prerouting dst-address-list=to-wg new-routing-mark Этап 4. Создание в созданной таблице маршрутизации дефолтного маршрута в интерфейс шлюза wireguard. ``` /ip route add disabled=no dst-address=0.0.0.0/0 gateway=wireguard1 routing-table=xoxo suppress-hw-offload=no ``` Этап 4. Правило NAT, что бы из локалки трафик уходил в туннель -
Denis Gritsenko revised this gist
Sep 16, 2024 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -2,7 +2,8 @@ Этап 1. Создаем таблицу маршрутизации ``` /routing table add disabled=no fib name=xoxo ``` Этап 2. Создание листа со списком сетей к которым нужно отправлять трафик. -
Denis Gritsenko revised this gist
Sep 16, 2024 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -7,6 +7,7 @@ Этап 2. Создание листа со списком сетей к которым нужно отправлять трафик. Адреса сервисов можно получить с помощью проекта https://github.com/Ground-Zerro/DomainMapper ``` /ip/firewall/address-list ``` -
Denis Gritsenko revised this gist
Sep 16, 2024 . No changes.There are no files selected for viewing
-
Denis Gritsenko revised this gist
Sep 16, 2024 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,6 +1,6 @@ Этап 0. Аренуем VPS, настраиваем туннель с роутером. Проще всего wireguard, но можно и l2tp и даже ipip Этап 1. Создаем таблицу маршрутизации ```/routing table add disabled=no fib name=xoxo ``` -
Denis Gritsenko renamed this gist
Sep 16, 2024 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
File renamed without changes. -
Denis Gritsenko revised this gist
Sep 16, 2024 . 1 changed file with 1 addition and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -2,8 +2,7 @@ # Этап 1. Создаем таблицу маршрутизации ```/routing table add disabled=no fib name=xoxo ``` Этап 2. Создание листа со списком сетей к которым нужно отправлять трафик. -
Denis Gritsenko revised this gist
Sep 16, 2024 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,6 +1,7 @@ # Этап 0. Аренуем VPS, настраиваем туннель с роутером. Проще всего wireguard, но можно и l2tp и даже ipip # Этап 1. Создаем таблицу маршрутизации ``` /routing table add disabled=no fib name=xoxo ``` -
Denis Gritsenko revised this gist
Sep 16, 2024 . 1 changed file with 11 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,19 +1,29 @@ # Этап 0. Аренуем VPS, настраиваем туннель с роутером. Проще всего wireguard, но можно и l2tp и даже ipip # Этап 1. Создаем таблицу маршрутизации ``` /routing table add disabled=no fib name=xoxo ``` Этап 2. Создание листа со списком сетей к которым нужно отправлять трафик. Адреса сервисов можно получить с помощью проекта https://github.com/Ground-Zerro/DomainMapper ``` /ip/firewall/address-list ``` Этап 3. Маркировка трафика. Тут на этапе когда трафик попадает в цепочку прероутинга мы маркируем трафик который идет к нужному нам списку сетей. Тут в качестве sourece указана внутрення сеть роутера ``` /ip firewall mangle add action=mark-routing chain=prerouting dst-address-list=to-wg new-routing-mark=xoxo passthrough=yes src-address=src-address=192.168.31.0/24 ``` Этап 4. Создание в созданной таблице маршрутизации дефолтного маршрута в интерфейс шлюза wireguard. ``` /ip route add disabled=no dst-address=0.0.0.0/0 gateway=wireguard1 routing-table=xoxo suppress-hw-offload= ``` Этап 4. Правило NAT, что бы из локалки трафик уходил в туннель ``` /ip firewall nat add action=masquerade chain=srcnat out-interface=wireguard1 ``` -
Denis Gritsenko renamed this gist
Sep 14, 2024 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
File renamed without changes. -
Denis Gritsenko revised this gist
Sep 14, 2024 . No changes.There are no files selected for viewing
-
Denis Gritsenko created this gist
Sep 14, 2024 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,19 @@ # Этап 0. Аренуем VPS, настраиваем туннель с роутером. Проще всего wireguard, но можно и l2tp и даже ipip # Этап 1. Создаем таблицу маршрутизации /routing table add disabled=no fib name=xoxo Этап 2. Создание листа со списком сетей к которым нужно отправлять трафик. Адреса сервисов можно получить с помощью проекта https://github.com/Ground-Zerro/DomainMapper /ip/firewall/address-list Этап 3. Маркировка трафика. Тут на этапе когда трафик попадает в цепочку прероутинга мы маркируем трафик который идет к нужному нам списку сетей. Тут в качестве sourece указана внутрення сеть роутера /ip firewall mangle add action=mark-routing chain=prerouting dst-address-list=to-wg new-routing-mark=xoxo passthrough=yes src-address=src-address=192.168.31.0/24 Этап 4. Создание в созданной таблице маршрутизации дефолтного маршрута в интерфейс шлюза wireguard. /ip route add disabled=no dst-address=0.0.0.0/0 gateway=wireguard1 routing-table=xoxo suppress-hw-offload= Этап 4. Правило NAT, что бы из локалки трафик уходил в туннель /ip firewall nat add action=masquerade chain=srcnat out-interface=wireguard1