关于代理:Wireguard部署
Wireguard部署背景应用Wireguard做VPN服务,平安的拜访内网中的资源应用Docker Compose部署frps部署在公网服务器上部署Frp服务端,配置文件frps.ini如下 [common]bind_port = ${port}# validation, same in frpc.initoken = ***# dashboard configdashboard_port = ${dashboard_port}dashboard_user = ${user}dashboard_pwd = ${passwd}bind port是承受Frp客户端连贯的端口(留神在云服务配置界面的防火墙配置中关上对应的端口)token用来验证Frp客户端连贯的合法性dashboard_port是Frp提供的dashboard的拜访端口,能够查看连贯状况执行docker run --restart=always --network host -d -v ${PWD}/frps.ini:/etc/frp/frps.ini --name frps snowdreamtech/frps 部署Frp服务端dashboard拜访端口能够不裸露在公网中,参考端口映射服务端部署Docker Compose联合 Frp内网穿透裸露部署在内网的VPN服务,wireguard.yaml version: "2"services: vpn: image: place1/wg-access-server volumes: - wg-data:/data ports: - 51820:51820/udp - 8000:8000 restart: unless-stopped cap_add: - NET_ADMIN environment: - WG_ADMIN_PASSWORD=admin - WG_WIREGUARD_PRIVATE_KEY=... devices: - /dev/net/tun:/dev/net/tun frp: image: snowdreamtech/frpc restart: always volumes: - ./frpc.ini:/etc/frp/frpc.ini container_name: frpc network_mode: "host"volumes: wg-data:WG_WIREGUARD_PRIVATE_KEY局部能够间接应用Wireguard生成一个私钥进去 ...