241 lines
		
	
	
	
		
			6.1 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			241 lines
		
	
	
	
		
			6.1 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| # Frequently Asked Questions
 | |
| 
 | |
| ## General Questions
 | |
| 
 | |
| ### Q: What is the VPN Gateway?
 | |
| **A:** It's a secure VPN gateway solution that routes all network traffic through a VPN connection with a permanent killswitch to prevent leaks.
 | |
| 
 | |
| ### Q: Which VPN providers are supported?
 | |
| **A:** 
 | |
| - Mullvad VPN (commercial service)
 | |
| - Custom WireGuard servers (your own VPS)
 | |
| - Any imported WireGuard configuration
 | |
| 
 | |
| ### Q: Can I use this with OpenVPN?
 | |
| **A:** No, this gateway only supports WireGuard protocol for better performance and security.
 | |
| 
 | |
| ### Q: Is this free to use?
 | |
| **A:** The software is free and open source. You need to provide your own VPN service (Mullvad account or custom server).
 | |
| 
 | |
| ## Installation
 | |
| 
 | |
| ### Q: What are the system requirements?
 | |
| **A:**
 | |
| - LXC container or Linux system
 | |
| - Ubuntu 20.04+ or Debian 11+
 | |
| - 512MB RAM minimum
 | |
| - 1GB disk space
 | |
| - Root access
 | |
| 
 | |
| ### Q: Can I install on a Raspberry Pi?
 | |
| **A:** Yes, as long as it runs a supported OS and has WireGuard kernel module support.
 | |
| 
 | |
| ### Q: Does it work in Docker?
 | |
| **A:** It requires privileged mode and NET_ADMIN capability. LXC is recommended over Docker.
 | |
| 
 | |
| ### Q: Can I install on a VPS?
 | |
| **A:** Yes, but be aware that the killswitch will block all traffic except through VPN, which might lock you out via SSH.
 | |
| 
 | |
| ## Usage
 | |
| 
 | |
| ### Q: No internet after disconnecting VPN?
 | |
| **A:** This is correct behavior! The killswitch blocks all internet traffic when VPN is not connected. This prevents leaks.
 | |
| 
 | |
| ### Q: Can I disable the killswitch?
 | |
| **A:** No, the killswitch cannot be disabled through normal means. This is a security feature.
 | |
| 
 | |
| ### Q: How do I access the WebUI?
 | |
| **A:** Navigate to `http://<container-ip>` in your browser. The WebUI is always accessible from the local network.
 | |
| 
 | |
| ### Q: Can I use multiple VPN connections simultaneously?
 | |
| **A:** No, only one VPN connection is active at a time. You can switch between servers/providers via the WebUI.
 | |
| 
 | |
| ## Security
 | |
| 
 | |
| ### Q: Is this really secure?
 | |
| **A:** Yes, when properly configured:
 | |
| - Permanent killswitch prevents leaks
 | |
| - DNS leak protection enabled
 | |
| - IPv6 completely disabled
 | |
| - Continuous security monitoring
 | |
| 
 | |
| ### Q: What about WebRTC leaks?
 | |
| **A:** WebRTC leaks are prevented at the firewall level. No direct peer connections are possible.
 | |
| 
 | |
| ### Q: Can applications bypass the VPN?
 | |
| **A:** No, all traffic is forced through the VPN tunnel or blocked by the killswitch.
 | |
| 
 | |
| ### Q: Is my traffic logged?
 | |
| **A:** The gateway itself doesn't log traffic. Logging depends on your VPN provider's policy.
 | |
| 
 | |
| ## Troubleshooting
 | |
| 
 | |
| ### Q: WebUI is not accessible
 | |
| **A:** 
 | |
| ```bash
 | |
| # Check if service is running
 | |
| sudo systemctl status vpn-webui
 | |
| 
 | |
| # Restart the service
 | |
| sudo systemctl restart vpn-webui
 | |
| 
 | |
| # Check if port is open
 | |
| sudo netstat -tlnp | grep 5000
 | |
| ```
 | |
| 
 | |
| ### Q: VPN won't connect
 | |
| **A:**
 | |
| 1. Check your credentials/keys are correct
 | |
| 2. Verify the server is reachable
 | |
| 3. Check firewall allows outbound UDP 51820
 | |
| 4. Review logs: `sudo journalctl -u vpn-webui -n 50`
 | |
| 
 | |
| ### Q: DNS not working
 | |
| **A:**
 | |
| ```bash
 | |
| # Check DNS configuration
 | |
| cat /etc/resolv.conf
 | |
| 
 | |
| # Test DNS resolution
 | |
| nslookup google.com
 | |
| 
 | |
| # Restart VPN connection
 | |
| sudo wg-quick down wg0
 | |
| sudo wg-quick up wg0
 | |
| ```
 | |
| 
 | |
| ### Q: High CPU usage
 | |
| **A:**
 | |
| - Check security monitor: `sudo systemctl status vpn-security-monitor`
 | |
| - Reduce monitoring frequency if needed
 | |
| - Check for packet loops in firewall rules
 | |
| 
 | |
| ## Configuration
 | |
| 
 | |
| ### Q: How do I add a custom DNS server?
 | |
| **A:** Edit the WireGuard configuration:
 | |
| ```bash
 | |
| sudo nano /etc/wireguard/wg0.conf
 | |
| # Change DNS = line to your preferred servers
 | |
| ```
 | |
| 
 | |
| ### Q: Can I change the WebUI port?
 | |
| **A:** Yes, edit the systemd service:
 | |
| ```bash
 | |
| sudo nano /etc/systemd/system/vpn-webui.service
 | |
| # Change --bind 0.0.0.0:5000 to your desired port
 | |
| sudo systemctl daemon-reload
 | |
| sudo systemctl restart vpn-webui
 | |
| ```
 | |
| 
 | |
| ### Q: How do I backup my configuration?
 | |
| **A:**
 | |
| ```bash
 | |
| sudo tar czf vpn-backup.tar.gz \
 | |
|   /opt/vpn-gateway \
 | |
|   /etc/wireguard \
 | |
|   /etc/systemd/system/vpn-*.service
 | |
| ```
 | |
| 
 | |
| ### Q: How do I enable auto-reconnect?
 | |
| **A:** Auto-reconnect is handled by the security monitor. Ensure it's running:
 | |
| ```bash
 | |
| sudo systemctl enable vpn-security-monitor
 | |
| sudo systemctl start vpn-security-monitor
 | |
| ```
 | |
| 
 | |
| ## Advanced
 | |
| 
 | |
| ### Q: Can I use split tunneling?
 | |
| **A:** Yes, for custom servers. Modify the AllowedIPs in your WireGuard config:
 | |
| ```ini
 | |
| # Only specific subnets through VPN
 | |
| AllowedIPs = 10.0.0.0/8, 172.16.0.0/12
 | |
| ```
 | |
| 
 | |
| ### Q: How do I set up failover?
 | |
| **A:** Add multiple peers in the WireGuard configuration:
 | |
| ```ini
 | |
| [Peer]
 | |
| # Primary
 | |
| PublicKey = xxx...
 | |
| Endpoint = primary.example.com:51820
 | |
| 
 | |
| [Peer] 
 | |
| # Backup
 | |
| PublicKey = yyy...
 | |
| Endpoint = backup.example.com:51820
 | |
| ```
 | |
| 
 | |
| ### Q: Can I monitor traffic statistics?
 | |
| **A:**
 | |
| ```bash
 | |
| # WireGuard statistics
 | |
| wg show wg0 transfer
 | |
| 
 | |
| # Network statistics
 | |
| vnstat -i wg0
 | |
| 
 | |
| # Real-time monitoring
 | |
| iftop -i wg0
 | |
| ```
 | |
| 
 | |
| ### Q: How do I integrate with existing infrastructure?
 | |
| **A:** 
 | |
| - Use as default gateway for network segments
 | |
| - Configure via DHCP options
 | |
| - Set up policy-based routing for specific clients
 | |
| 
 | |
| ## Updates
 | |
| 
 | |
| ### Q: How do I update the VPN Gateway?
 | |
| **A:**
 | |
| ```bash
 | |
| sudo /usr/local/bin/vpn-update.sh
 | |
| ```
 | |
| 
 | |
| ### Q: Will updates break my configuration?
 | |
| **A:** No, updates preserve your configuration. Backups are created automatically.
 | |
| 
 | |
| ### Q: How do I check for updates?
 | |
| **A:**
 | |
| ```bash
 | |
| # Check current version
 | |
| cat /opt/vpn-gateway/version
 | |
| 
 | |
| # Check for updates
 | |
| curl -s https://raw.githubusercontent.com/yourusername/vpn-gateway/main/version
 | |
| ```
 | |
| 
 | |
| ## Support
 | |
| 
 | |
| ### Q: Where can I get help?
 | |
| **A:**
 | |
| - GitHub Issues: https://github.com/yourusername/vpn-gateway/issues
 | |
| - Documentation: https://github.com/yourusername/vpn-gateway/wiki
 | |
| - Community Forum: [Link to forum]
 | |
| 
 | |
| ### Q: How do I report a bug?
 | |
| **A:** Open an issue on GitHub with:
 | |
| - System information
 | |
| - Error messages
 | |
| - Steps to reproduce
 | |
| - Relevant logs
 | |
| 
 | |
| ### Q: Can I contribute?
 | |
| **A:** Yes! Contributions are welcome:
 | |
| - Submit pull requests
 | |
| - Report bugs
 | |
| - Improve documentation
 | |
| - Share your setup
 | |
| 
 | |
| ## Legal
 | |
| 
 | |
| ### Q: Is this legal to use?
 | |
| **A:** Yes, but check your local laws regarding VPN usage. Some countries restrict VPN use.
 | |
| 
 | |
| ### Q: Can I use this commercially?
 | |
| **A:** Yes, under the MIT license terms. See LICENSE file for details.
 | |
| 
 | |
| ### Q: What about warranty?
 | |
| **A:** This software is provided "as is" without warranty. Use at your own risk.
 |