From 8b2c29e0cf99b4612838110fb70a90c1d06c8786 Mon Sep 17 00:00:00 2001 From: CleanMachine1 <78213164+CleanMachine1@users.noreply.github.com> Date: Tue, 19 Apr 2022 17:34:00 +0200 Subject: [PATCH] Add requirement of nftables to wireguard config Signed-off-by: CleanMachine1 <78213164+CleanMachine1@users.noreply.github.com> --- docs/guides/vpn/wireguard/internal.md | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/guides/vpn/wireguard/internal.md b/docs/guides/vpn/wireguard/internal.md index d87f969..42250d5 100644 --- a/docs/guides/vpn/wireguard/internal.md +++ b/docs/guides/vpn/wireguard/internal.md @@ -47,6 +47,7 @@ PostDown = iptables -w -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -w !!! warning "**Important:** Debian Bullseye (Debian 11) and Raspian 11" Debian Bullseye doesn't include iptables per default and uses nftables. + (you may need to install `nftables` using `sudo apt-get install nftables`) We have to set following rules for PostUP and PostDown: ```bash