diff options
author | Julien Dessaux | 2022-04-30 23:05:01 +0200 |
---|---|---|
committer | Julien Dessaux | 2022-04-30 23:05:01 +0200 |
commit | fd5e65b5c346907478b1e0c6431a3a3b79b37519 (patch) | |
tree | 51eec269d183a0d9b5ead0f3a8813e3d82d830bc /content/docs/freebsd | |
parent | Added the kite runner book article (diff) | |
download | www-fd5e65b5c346907478b1e0c6431a3a3b79b37519.tar.gz www-fd5e65b5c346907478b1e0c6431a3a3b79b37519.tar.bz2 www-fd5e65b5c346907478b1e0c6431a3a3b79b37519.zip |
Updated old docs articles
Diffstat (limited to 'content/docs/freebsd')
-rw-r--r-- | content/docs/freebsd/remote_install.md | 2 | ||||
-rw-r--r-- | content/docs/freebsd/wireguard.md | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/content/docs/freebsd/remote_install.md b/content/docs/freebsd/remote_install.md index 7bc9f63..7fbf8fd 100644 --- a/content/docs/freebsd/remote_install.md +++ b/content/docs/freebsd/remote_install.md @@ -18,7 +18,7 @@ wget https://download.freebsd.org/ftp/releases/VM-IMAGES/13.0-RELEASE/amd64/Late ``` When all is done, force a reboot of your machine and connect to the remote console. Your FreeBSD system should boot and leave you with an authentication prompt. Just type in root (it will not ask for a password) and go through this post installation checklist : -- run `freebsd-update fetch install` +- run `freebsd-update fetch install` then reboot - set a root password with `passwd` - add a user account with `adduser`, put it in the `wheel` group - add a ssh authorized_keys for your new user diff --git a/content/docs/freebsd/wireguard.md b/content/docs/freebsd/wireguard.md index f4e09fe..62bb7df 100644 --- a/content/docs/freebsd/wireguard.md +++ b/content/docs/freebsd/wireguard.md @@ -42,7 +42,7 @@ AllowedIPs = 10.1.2.9/32 PersistentKeepalive = 60 ``` -To implement this example you will need to generate two sets of keys. The configuration for the first server will feature the first server's private key in the `[Interface]` section and the second server's public key in the `[Peer]` section, and vice versa. +To implement this example you will need to generate two sets of keys. The configuration for the first server will feature the first server's private key in the `[Interface]` section and the second server's public key in the `[Peer]` section, and vice versa for the configuration of the second server. This example is from a machine that can be hidden behind nat therefore I configure a `PersistentKeepalive`. If your host has a public IP this line is not needed. |