Blame docs/api/html/settings-wireguard.html

Packit 5756e2
Packit 5756e2
<html>
Packit 5756e2
<head>
Packit 5756e2
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
Packit 5756e2
<title>wireguard: NetworkManager Reference Manual</title>
Packit 5756e2
<meta name="generator" content="DocBook XSL Stylesheets Vsnapshot">
Packit 5756e2
<link rel="home" href="index.html" title="NetworkManager Reference Manual">
Packit 5756e2
<link rel="up" href="ch01.html" title="Configuration Settings">
Packit 5756e2
<link rel="prev" href="settings-802-3-ethernet.html" title="802-3-ethernet">
Packit 5756e2
<link rel="next" href="settings-802-11-wireless.html" title="802-11-wireless">
Packit Service 018b0a
<meta name="generator" content="GTK-Doc V1.33.0 (XML mode)">
Packit 5756e2
<link rel="stylesheet" href="style.css" type="text/css">
Packit 5756e2
</head>
Packit 5756e2
<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
Packit 5756e2
Packit 5756e2
Packit 5756e2
Top  | 
Packit 5756e2
                  
Packit 5756e2
            Properties
Packit 5756e2
        
Packit 5756e2
Packit 5756e2
Home
Packit 5756e2
Up
Packit 5756e2
Prev
Packit 5756e2
Next
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2

wireguard

Packit 5756e2

wireguard — WireGuard Settings

Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2

Packit 5756e2
            Properties
Packit 5756e2
        
Packit 5756e2
Packit Service a1bd4f

Table 89. 

Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Key Name
Packit 5756e2
Value Type
Packit 5756e2
Default Value
Packit 5756e2
Value Description
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
fwmark
Packit 5756e2
uint32
Packit 5756e2
0
Packit 5756e2
The use of fwmark is optional and is by default off. Setting it to 0 disables it. Otherwise, it is a 32-bit fwmark for outgoing packets. Note that "ip4-auto-default-route" or "ip6-auto-default-route" enabled, implies to automatically choose a fwmark.
Packit 5756e2
Packit 5756e2
Packit 5756e2
ip4-auto-default-route
Packit 5756e2
NMTernary (int32)
Packit 5756e2
Packit 5756e2
Whether to enable special handling of the IPv4 default route. If enabled, the IPv4 default route from wireguard.peer-routes will be placed to a dedicated routing-table and two policy routing rules will be added. The fwmark number is also used as routing-table for the default-route, and if fwmark is zero, an unused fwmark/table is chosen automatically. This corresponds to what wg-quick does with Table=auto and what WireGuard calls "Improved Rule-based Routing". Note that for this automatism to work, you usually don't want to set ipv4.gateway, because that will result in a conflicting default route. Leaving this at the default will enable this option automatically if ipv4.never-default is not set and there are any peers that use a default-route as allowed-ips.
Packit 5756e2
Packit 5756e2
Packit 5756e2
ip6-auto-default-route
Packit 5756e2
NMTernary (int32)
Packit 5756e2
Packit 5756e2
Like ip4-auto-default-route, but for the IPv6 default route.
Packit 5756e2
Packit 5756e2
Packit 5756e2
listen-port
Packit 5756e2
uint32
Packit 5756e2
0
Packit 5756e2
The listen-port. If listen-port is not specified, the port will be chosen randomly when the interface comes up.
Packit 5756e2
Packit 5756e2
Packit 5756e2
mtu
Packit 5756e2
uint32
Packit 5756e2
0
Packit 5756e2
If non-zero, only transmit packets of the specified size or smaller, breaking larger packets up into multiple fragments. If zero a default MTU is used. Note that contrary to wg-quick's MTU setting, this does not take into account the current routes at the time of activation.
Packit 5756e2
Packit 5756e2
Packit 5756e2
peer-routes
Packit 5756e2
boolean
Packit 5756e2
TRUE
Packit 5756e2
Whether to automatically add routes for the AllowedIPs ranges of the peers. If TRUE (the default), NetworkManager will automatically add routes in the routing tables according to ipv4.route-table and ipv6.route-table. Usually you want this automatism enabled. If FALSE, no such routes are added automatically. In this case, the user may want to configure static routes in ipv4.routes and ipv6.routes, respectively. Note that if the peer's AllowedIPs is "0.0.0.0/0" or "::/0" and the profile's ipv4.never-default or ipv6.never-default setting is enabled, the peer route for this peer won't be added automatically.
Packit 5756e2
Packit 5756e2
Packit 5756e2
peers
Packit 5756e2
array of 'a{sv}'
Packit 5756e2
Packit 5756e2
Array of dictionaries for the WireGuard peers.
Packit 5756e2
Packit 5756e2
Packit 5756e2
private-key
Packit 5756e2
string
Packit 5756e2
Packit 5756e2
The 256 bit private-key in base64 encoding.
Packit 5756e2
Packit 5756e2
Packit 5756e2
private-key-flags
Packit 5756e2
NMSettingSecretFlags (uint32)
Packit 5756e2
Packit 5756e2
Flags indicating how to handle the "private-key" property.
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit 5756e2


Packit 5756e2
Packit 5756e2
Packit 5756e2
Packit Service 018b0a

Generated by GTK-Doc V1.33.0
Packit 5756e2
</body>
Packit 5756e2
</html>