{"id":3884,"date":"2026-01-07T18:13:01","date_gmt":"2026-01-07T09:13:01","guid":{"rendered":"https:\/\/www.freelifemakers.org\/wordpress\/?p=3884"},"modified":"2026-01-08T12:45:25","modified_gmt":"2026-01-08T03:45:25","slug":"linuxwireguard-howto-install-wireguarrd","status":"publish","type":"post","link":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/2026\/01\/07\/linuxwireguard-howto-install-wireguarrd\/","title":{"rendered":"[linux]Wireguard\uc124\uce58\ubc29\ubc95 \/ How to install Wireguard"},"content":{"rendered":"\n<p>\ud83d\udc49\ud83c\udffb Wireguard\ub294 VPN(Virtual Private Network)\uc11c\ubc84\uc774\ub984\uc785\ub2c8\ub2e4.<br>Wireguard is the name of a VPN (Virtual Private Network) server.<\/p>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb\uc804\uc6a9 \ubb3c\ub9ac\uc801\uc778 \uc804\uc6a9\uc120\uc744 \uae4c\ub294 \uac83\uc774 \uc544\ub2c8\ub77c, \ub204\uad6c\ub098 \uc0ac\uc6a9\ud558\ub294 \uacf5\uc6a9 \uc778\ud130\ub137\ub9dd \uc704\uc5d0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc801\uc73c\ub85c \ub9cc\ub4e0 \uac00\uc0c1\uc758 \ud1b5\ub85c\ub77c\ub294 \ub73b\uc785\ub2c8\ub2e4.<br>It means that rather than laying a dedicated physical dedicated line, it is a virtual passage created through software on top of the public Internet network that anyone can use.<\/p>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb VPN\uc11c\ubc84\ub97c \uad6c\ucd95\ud558\uace0 \uc678\ubd80\uc5d0\uc11c VPN\ub124\ud2b8\uc6cc\ud06c\ub85c \uc811\uc18d\ud558\uba74 VPN\uc11c\ubc84\uc640 \ub3d9\uc77c\ud55c \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc811\uc18d\ud55c\uac83 \uac19\uc740 \uc0c1\ud0dc\uac00 \ub429\ub2c8\ub2e4.<br>When you set up a VPN server and connect to the VPN network from outside, it will feel like you are connected to the same network as the VPN server.<\/p>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb ip\uacf5\uc720\uae30 \ud658\uacbd\uc5d0\uc11c\ub294 ip\uacf5\uc720\uae30\uc5d0 \uc5f0\uacb0\ub41c pc\uc640 \ub3d9\uc77c\ud55c \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc811\uc18d \uc0c1\ud0dc\uac00 \ub429\ub2c8\ub2e4.<br>In an IP sharing environment, you will be connected to the same network as the PC connected to the IP sharing device.<\/p>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb VPN\ub124\ud2b8\uc6cc\ud06c\ub294 \uc554\ud638\ud654 \ub418\uae30 \ub54c\ubb38\uc5d0 \uc774 \ub124\ud2b8\uc6cc\ud06c\ub85c \uc804\uc1a1\ub418\ub294 \ub370\uc774\ud130\ub97c  \ud655\uc778 \ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4.<br>Because the VPN network is encrypted, data transmitted over this network cannot be viewed.<\/p>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb Wiregurad \uc124\uce58 \/ Install Wireguard<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update\nsudo apt install wireguard<\/code><\/pre>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb \ud544\uc218 \ud328\ud0a4\uc9c0 \ubc0f \ud655\uc778 \ucee4\ub110 \ubaa8\ub4c8 \ub85c\ub4dc<br>Load required packages and verify kernel modules<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update\nsudo apt install wireguard-tools  \nsudo modprobe wireguard  # \ubaa8\ub4c8 \ub85c\ub4dc \ud655\uc778 \/ Verify module loading\nlsmod | grep wireguard   # \ubaa8\ub4c8 \ubaa9\ub85d \ud655\uc778 \/ Module list<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udc49\ud83c\udffb<strong>\ud0a4 (\uc11c\ubc84\uc6a9)<\/strong> \/ Key (for server)<\/h4>\n\n\n\n<p>\u2714\ufe0f\uac1c\uc778 \ud0a4\uc640 \uacf5\uac1c \ud0a4 \ub9cc\ub4e4\uae30 \/ Creating private and public keys<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>wg genkey | sudo tee \/etc\/wireguard\/privatekey | wg pubkey | sudo tee \/etc\/wireguard\/publickey<\/code><\/pre>\n\n\n\n<p>server_private.key : \uc11c\ubc84 \uac1c\uc778 \ud0a4 (\uc808\ub300 \uacf5\uc720 \uae08\uc9c0!) \/ Server private key (never share!)<\/p>\n\n\n\n<p>server_public.key : \uc11c\ubc84 \uacf5\uac1c \ud0a4(\ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0\uc11c \uc0ac\uc6a9\ub428.) \/ Server public public(Used by clients.)<\/p>\n\n\n\n<p>\u2714\ufe0f\ud0a4\ubcf4\uae30 \/ VIew key<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo cat \/etc\/wireguard\/privatekey # \uac1c\uc778\ud0a4 \/ private key\nsudo cat \/etc\/wireguard\/publickey # \uacf5\uac1c\ud0a4 \/ public key<\/code><\/pre>\n\n\n\n<p>\ud83d\udc49\ud83c\udffbWireGuard \uc778\ud130\ud398\uc774\uc2a4 \uc124\uc815 \ud30c\uc77c \ub9cc\ub4e4\uae30<br>Creating a WireGuard interface configuration file<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/wireguard\/wg0.conf<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f wg0.conf\uc5d0 \uc544\ub798\uc758  \ub0b4\uc6a9 \ucd94\uac00\ud558\uae30 ( [Interface]&#8230;)<br>Add the following to wg0.conf ( [Interface]\u2026)<\/p>\n\n\n\n<p>\u2b50\ufe0f \ub0b4 pc \ub79c\uce74\ub4dc \uc774\ub984 \ud655\uc778 \ud558\uae30 \uc800\uc758 \uacbd\uc6b0\ub294 enp2s0\uc785\ub2c8\ub2e4.<br>Check the name of my PC&#8217;s LAN card. In my case, it is enp2s0.<\/p>\n\n\n\n<p>\u2b50\ufe0f  PostUp\uacfc PostDown\uc5d0 \ub79c\uce74\ub4dc \uc774\ub984\uc774 \uc815\ud655\ud558\uc9c0 \uc54a\uc73c\uba74 \uc624\ub958 \ubc1c\uc0dd\ud569\ub2c8\ub2e4. <br>An error will occur if the LAN card name is incorrect in PostUp and PostDown.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip route list default | awk '{print $5}'<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Interface]\nPrivateKey = &lt;\uc11c\ubc84\uc758_privatekey_\ub0b4\uc6a9&gt;\nAddress = 10.0.0.1\/24\nListenPort = 51820\n\n# \uc778\ud130\ub137 \uacf5\uc720 \uc124\uc815 (\ub79c\uce74\ub4dc \uc774\ub984\uc5d0 \uc8fc\uc758\ud558\uc138\uc694!)\nPostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o enp2s0 -j MASQUERADE\nPostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o enp2s0 -j MASQUERADE<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f\uc11c\ubc84\uc2dc\uc791 \/ Server Start<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo wg-quick up wg0<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f \ubd80\ud305\uc2dc \uc790\ub3d9 \uc2dc\uc791 \uc801\uc6a9 \/ Apply auto-start at boot<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl enable wg-quick@wg0<\/code><\/pre>\n\n\n\n<p>\ud83d\udc49\ud83c\udffbIP \ud3ec\uc6cc\ub529 \uc124\uc815 \/ IP forwarding settings<\/p>\n\n\n\n<p>\u2714\ufe0f \ub124\ud2b8\uc6cc\ud06c \ub0b4\uc758 \ub2e4\ub978 \uc11c\ubc84\uc811\uc18d\uc744 \uc704\ud574\uc11c \ud544\uc694\ud569\ub2c8\ub2e4.<br>Required for connecting to other servers within the network.<\/p>\n\n\n\n<p>\u2714\ufe0f \ud3ec\uc6cc\ub529 \uc124\uc815 \uba85\ub839\uc5b4\ub97c \uc9c0\uae08 \ubc14\ub85c \uc801\uc6a9\ud569\ub2c8\ub2e4. <br>Apply the forwarding configuration command now.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo sysctl -w net.ipv4.ip_forward=1<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f \ud3ec\uc6cc\ub529 \uc124\uc815 \uba85\ub839\uc5b4\uac00 \uc7ac\ubd80\ud305\ub418\uba74 \ucd08\uae30\ud654 \ub418\uae30\ub54c\ubb38\uc5d0 \uc601\uad6c \uc801\uc6a9\ud569\ub2c8\ub2e4.<br>The forwarding configuration command is applied permanently because it is initialized when rebooted.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>echo \"net.ipv4.ip_forward=1\" | sudo tee -a \/etc\/sysctl.conf\nsudo sysctl -p<\/code><\/pre>\n\n\n\n<p>\u2b50\ufe0f \ud604\uc7ac \ud3ec\uc6cc\ub529 \uc124\uc815\uc774 \uc801\uc6a9\ub410\ub294\uc9c0 \ud655\uc778 \ud558\uae30(1\uc774 \ud45c\uc2dc\ub418\uba74 \ud3ec\uc6cc\ub529 \uc124\uc815\uc0c1\ud0dc)<br>Check if the current forwarding settings are applied (if 1 is displayed, the forwarding settings status)<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cat \/proc\/sys\/net\/ipv4\/ip_forward<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u2b50\ufe0f \ub3c4\ucee4\ub97c \uc0ac\uc6a9\ud558\ub294 \uacbd\uc6b0 \/etc\/sysctl.conf \uc5ec\uae30\uc5d0 \uc544\ubb34 \uae30\ub85d\uc774 \uc5c6\uc5b4\ub3c4 \uc7ac\ubd80\ud305\uc2dc ip_forward\uac00 1\ub85c \ucd9c\ub825\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<br>If you are using Docker, ip_forward may be output as 1 on reboot even if there is no record in \/etc\/sysctl.conf.<br><br>\u2b50\ufe0f \/etc\/sysctl.conf \uc5d0 \uae30\ub85d\ub41c \ub0b4\uc6a9\uc740 \uc7ac\ubd80\ud305\uc2dc\uc5d0\ub3c4 \uc801\uc6a9\ub418\uba70 sudo sysctl -p \uba85\ub839\uc5b4\ub85c \ucee4\ub110\uc5d0 \uc801\uc6a9\ud569\ub2c8\ub2e4.<br>\ub9cc\uc57d\uc744 \uc704\ud574\uc11c \/etc\/sysctl.conf \uc5d0 \uae30\ub85d\uc744 \ud574\ub461\ub2c8\ub2e4.<br>The contents of \/etc\/sysctl.conf are applied even upon reboot, and the sudo sysctl -p command applies them to the kernel. Just in case, record them in \/etc\/sysctl.conf.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb \ubc29\ud654\ubcbd \uc124\uc815 (UFW \uc0ac\uc6a9\uc2dc)<br>Firewall settings (when using UFW)<\/p>\n\n\n\n<p>\u2714\ufe0f 51820\/udp \ubc29\ud654\ubcbd \uc624\ud508<br>51820\/udp firewall open<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo ufw allow 51820\/udp<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f \ubc29\ud654\ubcbd \uc124\uc815 \uc0c1\ud0dc \ud655\uc778<br>Check firewall settings status<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo ufw status<\/code><\/pre>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb WireGuard \uc2dc\uc791 \ubc0f \uc790\ub3d9 \ubd80\ud305 \uc124\uc815<br>Starting WireGuard and Setting Up Autoboot<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo wg-quick up wg0    # \uc2dc\uc791 (wg0\ub294 conf \ud30c\uc77c \uc774\ub984)\nsudo systemctl enable wg-quick@wg0  # \ubd80\ud305 \uc2dc \uc790\ub3d9 \uc2dc\uc791<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo wg show<\/code><\/pre>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb \ud074\ub77c\uc774\uc5b8\ud2b8 \uc124\uc815\ud558\uae30(\uc548\ub4dc\ub85c\uc774\ub4dc)<br>Setting up the client (Android)<\/p>\n\n\n\n<p>\u2714\ufe0f \ub3c4\uad6c \uc124\uce58\ud558\uae30 \/ Install tools<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update\nsudo apt install qrencode<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f\ud074\ub77c\uc774\uc5b8\ud2b8 \ud0a4 \uc0dd\uc131 \/ Generate client key<\/p>\n\n\n\n<p>\uc124\uce58\uac00 \ub05d\ub098\uc168\ub2e4\uba74, \uc544\ub798 \uba85\ub839\uc5b4\ub97c \ubcf5\uc0ac\ud574\uc11c \uc2e4\ud589\ud574 \ubcf4\uc138\uc694. (\uc811\uc18d\ud560 \uae30\uae30 1\ub300\ub97c \uc704\ud55c \ud0a4 \uc30d\uc785\ub2c8\ub2e4.)<br>Once the installation is complete, copy and run the command below. (This is a key pair for one device you want to connect to.)<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># \ud074\ub77c\uc774\uc5b8\ud2b8\uc6a9 \ud0a4 \uc0dd\uc131 \ubc0f \ud30c\uc77c \uc800\uc7a5\n# Generate a key for the client and save the file\nwg genkey | tee client_privatekey | wg pubkey > client_publickey\n\n# \uc124\uc815 \ud655\uc778\n# Check settings\necho \"Client Private Key: $(cat client_privatekey)\"\necho \"Client Public Key: $(cat client_publickey)\"<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f\uc124\uc815 \ud30c\uc77c \uc218\uc815 \/ Edit configuration file<\/p>\n\n\n\n<p>&#8212; public key \ucd94\uac00 \/ Add public key<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/wireguard\/wg0.conf<\/code><\/pre>\n\n\n\n<p>&#8212; \ud074\ub77c\uc774\uc5b8\ud2b8\uc124\uc815 \/ Client settings<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Peer]\n# cat client_publickey\ub85c \ud655\uc778\ud55c \ubb38\uc790\uc5f4\uc744 \ub123\uc73c\uc138\uc694\n# Enter the string verified with cat client_publickey\nPublicKey = d9UB\/d9UB\/d9UB\/d9UB\/d9UB\/d9UB\/d9UB\/ # \uc9c4\uc9dc \ud0a4 \uc544\ub2d8 \/ Not a real key\n\n# \uc774 \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0\uac8c \ubd80\uc5ec\ud560 \uac00\uc0c1 IP (\uc11c\ubc84\uac00 .1\uc774\ubbc0\ub85c .2\ub97c \uc90d\ub2c8\ub2e4)\n# Virtual IP to assign to this client (since the server is .1, we give it .2)\nAllowedIPs = 10.0.0.2\/32<\/code><\/pre>\n\n\n\n<p>&#8212; \uc11c\ubc84 \ubc0f \ud074\ub77c\uc774\uc5b8\ud2b8 \uc804\uccb4 \uc124\uc815 \/ Full server and client settings<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Interface] # \uc804\uccb4 \uc124\uc815 \/ full settings\nPrivateKey = (\uc11c\ubc84 \uac1c\uc778\ud0a4 \/ Server private key)\nAddress = 10.0.0.1\/24\nListenPort = 51820\n\n# PostUp\uacfc PostDown\uc740 \uac01\uac01 \ud55c \uc904\ub85c \uae38\uac8c \uc774\uc5b4\uc838\uc57c \ud569\ub2c8\ub2e4\n# PostUp and PostDown must each be on one long line\n\nPostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o enp2s0 -j MASQUERADE\nPostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o enp2s0 -j MASQUERADE\n\n&#91;Peer]\nPublicKey = (\ud074\ub77c\uc774\uc5b8\ud2b8 \uacf5\uac1c\ud0a4 \/ client public key)\nAllowedIPs = 10.0.0.2\/32<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f wireguard \uc11c\ubc84 \uc7ac\uc2dc\uc791<br>wireguard server restart<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># \uaf2c\uc778\uc778\ud130\ud398\uc774\uc2a4 \uc788\uc73c\uba74 \uc0ad\uc81c\n# If there is a tangled interface, delete it.\nsudo ip link delete wg0 2>\/dev\/null\n\n# \ub2e4\uc2dc \uc2dc\uc791\n# restart\nsudo systemctl restart wg-quick@wg0\n\n# \uc0c1\ud0dc \ud655\uc778\n# Check status\nsudo wg show<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f \ub2e4\uc74c\uacfc \uac19\uc740 \ud615\ud0dc\ub85c  \ucd9c\ub825\uc774\uba74 \uc815\uc0c1<br>If the output is in the following format, it is normal<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>~$ sudo wg show\ninterface: wg0\n  public key: uCeRw5uCeRw5uCeRw5uCeRw5uCeRw5uCeRw5\n  private key: (hidden)\n  listening port: 51820\n\npeer: dPKVpzdPKVpzdPKVpzdPKVpzdPKVpzdPKVpzdPKVpzd\n  allowed ips: 10.0.0.2\/32<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f \ud074\ub77c\uc774\uc5b8\ud2b8 \ud30c\uc77c \uc791\uc131<br>Create client file<\/p>\n\n\n\n<p>&#8211;\uc5b4\ub514\uc5d0 \ub9cc\ub4e4\uc5b4\ub3c4 \uc0c1\uad00 \uc5c6\uc9c0\ub9cc \/home\/yourhome\/wgClientConfig\/ \uc774 \uc704\uce58\uc5d0 \ub9cc\ub4ed\ub2c8\ub2e4.<br>It doesn&#8217;t matter where you create it, but create it in \/home\/yourhome\/wgClientConfig\/ <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nano client.conf<\/code><\/pre>\n\n\n\n<p>&#8212; \ud544\uc694\ud55c \uc815\ubcf4 \ud655\uc778\ud558\uae30<br>Find the information you need<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># \ud074\ub77c\uc774\uc5b8\ud2b8 \uac1c\uc778\ud0a4 \ud655\uc778\n# Verify client private key\ncat ~\/client_privatekey\n\n# \uc11c\ubc84 \uacf5\uac1c\ud0a4 \ud655\uc778\n# Verify server public key\nsudo cat \/etc\/wireguard\/publickey\n\n# \uc11c\ubc84\uc758 \uacf5\uc778 IP \ud655\uc778 (\ub3c4\uba54\uc778\uc73c\ub85c \uc785\ub825\ud574\ub3c4 \ub428.)\n# Check the server's public IP (you can also enter it as a domain)\ncurl ifconfig.me<\/code><\/pre>\n\n\n\n<p>&#8212; client.conf<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Interface]\nPrivateKey = (\ud074\ub77c\uc774\uc5b8\ud2b8 \uac1c\uc778\ud0a4 \/ Client private key)\nAddress = 10.0.0.2\/24\nDNS = 1.1.1.1\n\n&#91;Peer]\nPublicKey = (\uc11c\ubc84 \uacf5\uac1c\ud0a4 \/ Server publick key)\nEndpoint = yourhost.iptime.org:51820\nAllowedIPs = 0.0.0.0\/0<\/code><\/pre>\n\n\n\n<p>\ud83d\udc49\ud83c\udffb \uc11c\ubc84\uc640 \ud074\ub77c\uc774\uc5b8\ud2b8 \uc5f0\uacb0\ud558\uae30<br>Connecting the server and client<\/p>\n\n\n\n<p>\u2714\ufe0fQR \ucf54\ub4dc \ub744\uc6b0\uae30 \/ Display QR code<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>qrencode -t ansiutf8 &lt; client.conf<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f\ubaa8\ubc14\uc77c \ud3f0\uc5d0\uc11c wireguare\uc571 \ubc1b\uc544\uc11c + \ud0ed\ud558\uace0 QR\ucf54\ub4dc \uc2a4\uce94\ud558\uace0 \uc774\ub984\uc744 \uc785\ub825 \ud569\ub2c8\ub2e4.<br>Download the WireGuar app on your mobile phone, tap +, scan the QR code, and enter  name.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"461\" height=\"1024\" data-id=\"3991\" src=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-461x1024.jpg\" alt=\"\" class=\"wp-image-3991\" srcset=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-461x1024.jpg 461w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-135x300.jpg 135w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-768x1707.jpg 768w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-691x1536.jpg 691w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-922x2048.jpg 922w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-400x889.jpg 400w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2-800x1778.jpg 800w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wireguard2.jpg 1080w\" sizes=\"auto, (max-width: 461px) 100vw, 461px\" \/><figcaption class=\"wp-element-caption\">Connection info.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"461\" height=\"1024\" data-id=\"3992\" src=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-461x1024.jpg\" alt=\"\" class=\"wp-image-3992\" srcset=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-461x1024.jpg 461w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-135x300.jpg 135w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-768x1707.jpg 768w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-691x1536.jpg 691w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-922x2048.jpg 922w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-400x889.jpg 400w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1-800x1778.jpg 800w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/wrireguard1.jpg 1080w\" sizes=\"auto, (max-width: 461px) 100vw, 461px\" \/><figcaption class=\"wp-element-caption\">Wireguard Switch<\/figcaption><\/figure>\n<\/figure>\n\n\n\n<p>\u2714\ufe0f\ubaa8\ubc14\uc77c \uc571\uc5d0\uc11c \uc2a4\uc704\uce58\ub97c \ucf1c\uace0\ub098\uc11c \uc11c\ubc84\uc5d0\uc11c \ub2e4\uc74c\uc744 \uc785\ub825\ud569\ub2c8\ub2e4.<br>After turning on the switch in the mobile app, enter the following on the server:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo wg show<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f\uc544\ub798\uc640 \uac19\uc774 \uc2dc\uac04\uc774 \ud45c\uc2dc\ub418\uba74 \uc131\uacf5\ud55c \uac83\uc785\ub2c8\ub2e4<br>If the time is displayed as below, it is successful.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>interface: wg0\n  public key: d9UBd9UBd9UBd9UBd9UBd9UBd9UB\n  private key: (hidden)\n  listening port: 51820\n\npeer: d9UBd9UBd9UBd9UBd9UBd9UBd9UBd9UB\n  endpoint: 192.168.0.1:46821\n  allowed ips: 10.0.0.2\/32\n  latest handshake: 51 seconds ago\n  transfer: 18.21 KiB received, 35.34 KiB sent<\/code><\/pre>\n\n\n\n<p>\u2714\ufe0f \ubaa8\ubc14\uc77c \ud3f0(\uc548\ub4dc\ub85c\uc774\ub4dc)\uc5d0\uc11c \ud655\uc778\ud558\uae30<br>Check on your mobile phone (Android)<\/p>\n\n\n\n<p>\uba3c\uc800 \ubaa8\ubc14\uc77c \ud3f0\uc5d0\uc11c wifi\uc811\uc18d\uc744 \ud574\uc81c\ud558\uace0 \ubaa8\ubc14\uc77c\ub370\uc774\ud130\ub9cc \ucf2d\ub2c8\ub2e4.<br>First, turn off Wi-Fi on your mobile phone and turn on only mobile data.<\/p>\n\n\n\n<p>\ud3ec\ud138 \uc0ac\uc774\ud2b8 \uac80\uc0c9\ucc3d\uc5d0\uc11c \ubaa8\ubc14\uc77c\ud3f0 \ube0c\ub77c\uc6b0\uc800\uc5d0\uc11c &#8220;\ub0b4 \uc544\uc774\ud53c&#8221;\ub610\ub294 &#8220;what is my ip address&#8221;\uac80\uc0c9\ud569\ub2c8\ub2e4.<br>Search for &#8220;my IP&#8221;(korean) or &#8220;what is my IP address&#8221; in the portal site search bar or on your mobile phone browser.<\/p>\n\n\n\n<p>\ud655\uc778\ub41c \uc544\uc774\ud53c \uc8fc\uc18c\uac00 \uacf5\uc720\uae30\uc5d0 \uc5f0\uacb0\ub41c \uc544\uc774\ud53c \uc8fc\uc18c\uc640 \uc77c\uce58\ud558\ub294\uc9c0 \ud655\uc778\ud558\uba74 wireguard\uac00 \uc815\uc0c1 \uc791\ub3d9\ud558\ub294\uac83\uc785\ub2c8\ub2e4.<br>If you verify that the verified IP address matches the IP address connected to the router, then Wireguard is working properly.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"461\" height=\"1024\" data-id=\"3989\" src=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-461x1024.jpg\" alt=\"\" class=\"wp-image-3989\" srcset=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-461x1024.jpg 461w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-135x300.jpg 135w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-768x1707.jpg 768w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-691x1536.jpg 691w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-922x2048.jpg 922w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-400x889.jpg 400w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1-800x1778.jpg 800w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip1.jpg 1080w\" sizes=\"auto, (max-width: 461px) 100vw, 461px\" \/><figcaption class=\"wp-element-caption\">english<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"461\" height=\"1024\" data-id=\"3990\" src=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-461x1024.jpg\" alt=\"\" class=\"wp-image-3990\" srcset=\"https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-461x1024.jpg 461w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-135x300.jpg 135w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-768x1707.jpg 768w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-691x1536.jpg 691w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-922x2048.jpg 922w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-400x889.jpg 400w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2-800x1778.jpg 800w, https:\/\/www.freelifemakers.org\/wordpress\/wp-content\/uploads\/2026\/01\/myip2.jpg 1080w\" sizes=\"auto, (max-width: 461px) 100vw, 461px\" \/><figcaption class=\"wp-element-caption\">korean<\/figcaption><\/figure>\n<\/figure>\n\n\n\n<p>\ub9ac\ub205\uc2a4\uc5d0\uc11c \uacf5\uc778 \uc544\uc774\ud53c \uc8fc\uc18c\ub294 \ub2e4\uc74c\uacfc \uac19\uc774 \ud655\uc778 \ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>In Linux, you can check your public IP address as follows:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl icanhazip.com<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udc49\ud83c\udffb Wireguard\ub294 VPN(Virtual Private Network)\uc11c\ubc84\uc774\ub984\uc785\ub2c8\ub2e4.Wireguard is the name of a VPN (Virtual Private Network) server. \ud83d\udc49\ud83c\udffb\uc804\uc6a9 \ubb3c\ub9ac\uc801\uc778 \uc804\uc6a9\uc120\uc744 \uae4c\ub294 \uac83\uc774 \uc544\ub2c8\ub77c, \ub204\uad6c\ub098 \uc0ac\uc6a9\ud558\ub294 \uacf5\uc6a9 \uc778\ud130\ub137\ub9dd \uc704\uc5d0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc801\uc73c\ub85c \ub9cc\ub4e0 \uac00\uc0c1\uc758 \ud1b5\ub85c\ub77c\ub294 \ub73b\uc785\ub2c8\ub2e4.It means that rather than laying a dedicated physical dedicated line, it is a virtual passage created through software on top of the public Internet [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,18,1],"tags":[],"class_list":["post-3884","post","type-post","status-publish","format-standard","hentry","category-linux","category-serverapp","category-uncategorized","missing-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/3884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/comments?post=3884"}],"version-history":[{"count":104,"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/3884\/revisions"}],"predecessor-version":[{"id":3994,"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/3884\/revisions\/3994"}],"wp:attachment":[{"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/media?parent=3884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/categories?post=3884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.freelifemakers.org\/wordpress\/index.php\/wp-json\/wp\/v2\/tags?post=3884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}