<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Wireguard on homelab</title>
    <link>https://homelab.nbkelley.com/tags/wireguard/</link>
    <description>Recent content in Wireguard on homelab</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://homelab.nbkelley.com/tags/wireguard/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Gluetun VPN Service</title>
      <link>https://homelab.nbkelley.com/docs/services/gluetun-vpn/</link>
      <pubDate>Fri, 01 May 2026 00:00:00 +0000</pubDate>
      <guid>https://homelab.nbkelley.com/docs/services/gluetun-vpn/</guid>
      <description>&lt;h1 id=&#34;gluetun-vpn-service&#34;&gt;Gluetun VPN Service&lt;a class=&#34;anchor&#34; href=&#34;#gluetun-vpn-service&#34;&gt;#&lt;/a&gt;&lt;/h1&gt;&#xA;&lt;h2 id=&#34;what-was-established&#34;&gt;What Was Established&lt;a class=&#34;anchor&#34; href=&#34;#what-was-established&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Gluetun&lt;/strong&gt; is a lightweight Docker container acting as a dedicated VPN gateway for other containers.&lt;/li&gt;&#xA;&lt;li&gt;Implements the &lt;strong&gt;sidecar pattern&lt;/strong&gt;: dependent containers (e.g., qBittorrent, nzbget, prowlarr) share Gluetun&amp;rsquo;s network namespace via &lt;code&gt;network_mode: &amp;quot;service:gluetun&amp;quot;&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;AirVPN selected as the provider over ProtonVPN/Mullvad due to superior port forwarding support required for P2P services.&lt;/li&gt;&#xA;&lt;li&gt;Container-level VPN on the servarr VM is architecturally separate from the network-level UniFi VPN on Helms Deep (VLAN 2).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;deployment-context&#34;&gt;Deployment Context&lt;a class=&#34;anchor&#34; href=&#34;#deployment-context&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Gluetun runs on the &lt;strong&gt;servarr VM&lt;/strong&gt; (&lt;code&gt;192.168.1.112&lt;/code&gt;) as part of the Servarr Docker Compose stack at &lt;code&gt;/docker/servarr/&lt;/code&gt;. It is configured via &lt;code&gt;.env&lt;/code&gt; file in that directory.&lt;/p&gt;</description>
    </item>
    <item>
      <title>UniFi Express VPN &amp; Network Management</title>
      <link>https://homelab.nbkelley.com/docs/networking/unifi-express-vpn/</link>
      <pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://homelab.nbkelley.com/docs/networking/unifi-express-vpn/</guid>
      <description>&lt;h1 id=&#34;unifi-express-vpn--network-management&#34;&gt;UniFi Express VPN &amp;amp; Network Management&lt;a class=&#34;anchor&#34; href=&#34;#unifi-express-vpn--network-management&#34;&gt;#&lt;/a&gt;&lt;/h1&gt;&#xA;&lt;h2 id=&#34;what-was-established&#34;&gt;What Was Established&lt;a class=&#34;anchor&#34; href=&#34;#what-was-established&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Methodology for configuring ProtonVPN WireGuard on UniFi Express.&lt;/li&gt;&#xA;&lt;li&gt;Kill switch implementation to prevent IP/DNS leaks when the VPN drops.&lt;/li&gt;&#xA;&lt;li&gt;Best practices for managing Netgear managed switches via dedicated subnets and secure ports.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;key-decisions&#34;&gt;Key Decisions&lt;a class=&#34;anchor&#34; href=&#34;#key-decisions&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;WireGuard Protocol&lt;/strong&gt;: Selected over OpenVPN for superior speed and efficiency on UniFi Express.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Kill Switch Pattern&lt;/strong&gt;: Default-deny WAN traffic; only allow forwarding through the &lt;code&gt;wg0&lt;/code&gt; interface.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Netgear Management&lt;/strong&gt;: Restrict switch web GUI access to a dedicated management VLAN/subnet using HTTPS.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;current-configuration&#34;&gt;Current Configuration&lt;a class=&#34;anchor&#34; href=&#34;#current-configuration&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;VPN Client&lt;/strong&gt;: ProtonVPN (WireGuard)&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Endpoint&lt;/strong&gt;: &lt;code&gt;us-123.protonvpn.net:51820&lt;/code&gt; (example high-speed server)&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;ProtonVPN DNS&lt;/strong&gt;: &lt;code&gt;10.2.0.1&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Allowed IPs&lt;/strong&gt;: &lt;code&gt;0.0.0.0/0&lt;/code&gt; (full tunnel)&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Netgear Switch Management Ports&lt;/strong&gt;:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;HTTP: &lt;code&gt;80&lt;/code&gt; (insecure, avoid)&lt;/li&gt;&#xA;&lt;li&gt;HTTPS: &lt;code&gt;443&lt;/code&gt; (secure web GUI)&lt;/li&gt;&#xA;&lt;li&gt;SSH: &lt;code&gt;22&lt;/code&gt; (CLI access)&lt;/li&gt;&#xA;&lt;li&gt;SNMP: &lt;code&gt;161&lt;/code&gt; (monitoring)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;historical-notes&#34;&gt;Historical Notes&lt;a class=&#34;anchor&#34; href=&#34;#historical-notes&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Conversation dated 2025-04-14.&lt;/li&gt;&#xA;&lt;li&gt;Gateway device referred to as UniFi Express (infrastructure list notes &amp;ldquo;UCG Express &amp;lsquo;Olorín&amp;rsquo; at 192.168.1.1&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;Netgear MS308E is the managed switch in the homelab.&lt;/li&gt;&#xA;&lt;li&gt;Kill switch and DNS leak prevention rely on &lt;code&gt;iptables&lt;/code&gt;/&lt;code&gt;nftables&lt;/code&gt; or UniFi OS firewall rules.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;open-questions&#34;&gt;Open Questions&lt;a class=&#34;anchor&#34; href=&#34;#open-questions&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Does UniFi Express support native WireGuard kill switch in the GUI, or is manual CLI firewall configuration required?&lt;/li&gt;&#xA;&lt;li&gt;Specific UniFi OS version and exact GUI paths for VPN/kill switch implementation.&lt;/li&gt;&#xA;&lt;li&gt;Whether split tunneling is needed for specific homelab services.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;related-pages&#34;&gt;Related Pages&lt;a class=&#34;anchor&#34; href=&#34;#related-pages&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/infrastructure/network/&#34;&gt;Network Infrastructure &amp;amp; VLANs&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/networking/vlan_setup/&#34;&gt;VLAN Configuration: OPNsense &amp;amp; Netgear MS308E&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/security/cloudflare_integration/&#34;&gt;Cloudflare Integration: SSL &amp;amp; DNS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/services/uptime-kuma/&#34;&gt;Uptime Kuma - Configuration &amp;amp; Integrations&lt;/a&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
