Wireguard Bastion

Deployment of Wireguard Bastion

Wireguard (WG) is the recommended VPN to enable private access channel to your clusters and resources. Wireguard is a fast secure & open-source VPN, with P2P traffic encryption.

Note that the terms WG Bastion and WG server are interchangeably used in this document.

Multiple WG servers will be required to provide a group of users access to certain resources. Multiple WG server may run on the same Virtual Machine (VM). A group of users who access to a particular WG server will have access to all private access channels that are connected to this WG server.

It is recommended to set up at least two channels, one for System Administrators, and one for OpenG2P Application Users (like Program Managers, Service Providers, etc). Further channels can be created based on the need.

Prerequisites

  • One virtual machine (VM) running on the same network as the rest of the nodes, and has access to them. For recommended configuration of the VM refer to Resource Requirements.

  • Firewall rules: Allow only 22/tcp, 51820-51830/udp ports.

  • Docker installed on the VM.

Installation

  • Clone the openg2p-deployment repo and navigate to the kubernetes/wireguard directory

  • Run this with root privileges:

    ./wg.sh <name for this wireguard server> <client ips subnet mask> <port> <no of peers> <subnet mask of the cluster nodes & lbs>
  • To create multiple wireguard servers, run the above script multiple times with appropriate parameters. For example:

    ./wg.sh wireguard_app_users 10.15.0.0/16 51820 254 172.16.0.0/24
    ./wg.sh wireguard_sys_admins 10.16.0.0/16 51821 254 172.16.0.0/24
  • Check logs of the servers and wait for all servers to finish startup. Example:

    docker logs -f wireguard_sys_admins

Routing to Nginx

  • Limit each WG server to allow access to only the required Nginx network interface. The following uses wireguard_app_users server example. Repeat this for all servers).

  • Comment out these lines in /etc/wireguard_app_users/rules.sh . (This allows everyone to access all IPs):

    iptables -A FORWARD -i wg0 -j ACCEPT
    iptables -A FORWARD -o wg0 -j ACCEPT
  • Add the following lines under the above lines in /etc/wireguard_app_users/rules.sh , repeat for all IPs of Nginx:

    iptables -P FORWARD DROP
    
    iptables -A FORWARD -i wg0 -d <First Internal IP of Nginx> -j ACCEPT
    iptables -A FORWARD -o wg0 -s <First Internal IP of Nginx> -j ACCEPT
    
    iptables -A FORWARD -i wg0 -d <Second Internal IP of Nginx> -j ACCEPT
    iptables -A FORWARD -o wg0 -s <Second Internal IP of Nginx> -j ACCEPT
  • Restart the server

    docker restart wireguard_app_users
  • Repeat the above for all the WG servers

Access to users

Refer to this Wireguard Access to Users

Wireguard client

To access systems behind Wireguard bastion, you need to install Wireguard client on your machine. Install the client as follows:

Last updated

Logo

Copyright © OpenG2P. This work is licensed under Creative Common Attribution (CC-BY-4.0) International license unless otherwise noted.