2021-09-05 22:43:48 -07:00
2021-09-06 02:17:10 +00:00
2021-08-27 19:28:51 +00:00
2021-07-10 06:29:16 -07:00
2021-09-06 02:12:57 +00:00
2021-09-05 07:13:48 +00:00
2021-07-10 06:29:16 -07:00
2021-09-05 07:37:35 +00:00
2021-08-27 19:16:48 +00:00
2020-11-09 10:13:02 -06:00
2021-08-04 07:39:36 -07:00
2021-09-01 18:05:12 +00:00
2020-04-21 20:49:55 -07:00
2021-07-22 17:50:54 -07:00
2020-11-04 10:14:20 -06:00
2021-08-04 18:11:28 -07:00
2021-08-19 12:29:05 -07:00
2021-07-10 06:29:16 -07:00
2020-04-21 20:49:55 -07:00
2021-08-27 22:04:52 +00:00
2021-09-02 23:42:49 +00:00
2021-09-05 22:43:48 -07:00
2021-07-10 06:29:16 -07:00
2021-09-05 03:38:25 +00:00

Test Coverage Status

IMG_0023

FireZone

  1. Intro
  2. Requirements
  3. Install
  4. Usage
  5. Architecture
  6. Contributing

Intro

firezone is an open-source WireGuard™-based VPN server and firewall for Linux designed to be secure and simple to set up and manage.

Use FireZone to:

  • Connect remote teams to a shared private cloud network
  • Set up your own WireGuard™ VPN
  • Block egress traffic from your devices to specific IPs and CIDR ranges
  • Connect remote teams to a secure virtual LAN

Requirements

FireZone currently supports the following Linux distros:

  • CentOS: 7, 8
  • Ubuntu: 18.04, 20.04
  • Debian: 10, 11
  • Fedora: 33, 34

If your distro isn't listed here please open an issue and we'll look into adding it.

FireZone requires a valid SSL certificate and a matching DNS record to run in production.

Install

  1. Download the relevant package for your distribution from the releases page
  2. Install with sudo rpm -i firezone-<version>.rpm or sudo dpkg -i firezone-<version>.deb depending on your distribution. This will unpack the application and set up necessary directory structure.
  3. Bootstrap the application with sudo firezone-ctl reconfigure. This will initialize config files, set up needed services and generate the default configuration.
  4. Edit the default configuration at /etc/firezone/firezone.rb. You'll want to make sure default['firezone']['fqdn'], default['firezone']['url_host'], default['firezone']['ssl']['certificate'], and default['firezone']['ssl']['certificate'] are set properly.
  5. Reconfigure the application to pick up the new changes: sudo firezone-ctl reconfigure.
  6. Finally, create an admin user with sudo firezone-ctl create_admin. Check the console for the login credentials.
  7. Now you should be able to log into the web UI at https://<your-server-fqdn>

Architecture

firezone is written in the Elixir programming language and composed as an Umbrella project consisting of three independent applications:

For now, firezone assumes these apps are all running on the same host.

Chef Omnibus is used to bundle all FireZone dependencies into a single distributable Linux package.

Contributing

See CONTRIBUTING.md.

WireGuard™ is a registered trademark of Jason A. Donenfeld.

Description
Enterprise-ready zero-trust access platform built on WireGuard®.
Readme Apache-2.0 169 MiB
Languages
Elixir 57.1%
Rust 29.2%
TypeScript 5.9%
Swift 3.3%
Kotlin 1.8%
Other 2.5%