{"id":1840,"date":"2025-12-15T17:25:09","date_gmt":"2025-12-15T20:25:09","guid":{"rendered":"https:\/\/www.nerdadas.com\/blog\/?p=1840"},"modified":"2025-12-15T17:25:09","modified_gmt":"2025-12-15T20:25:09","slug":"wireguard-road-warrior-cliente-servidor-christmas-post","status":"publish","type":"post","link":"https:\/\/www.nerdadas.com\/blog\/wireguard-road-warrior-cliente-servidor-christmas-post\/","title":{"rendered":"Wireguard Road Warrior (Cliente Servidor) &#8211; Christmas Post!"},"content":{"rendered":"\n<p>Lleg\u00f3 la navidad y es hora de armar el arbolito. En otro momento escrib\u00ed un post explicando como conectar una<strong> VPN Site to Site con Wireguard<\/strong>. (<a href=\"https:\/\/www.nerdadas.com\/blog\/vpn-site-to-site-con-wireguard\/\">https:\/\/www.nerdadas.com\/blog\/vpn-site-to-site-con-wireguard\/<\/a>). Esta vez es una <strong>VPN Road Warrior<\/strong>, algo que va mejor en una empresa donde sus empleados se conectan a la sucursal central remotamente a diario.<\/p>\n\n\n\n<p>Las<strong> interfaces Wireguard<\/strong> en el router <strong>no tienen la capacidad<\/strong> de correr un<strong> dhcp-server,<\/strong> por lo tanto las ips se agregan estaticamente. Esto provoca que muchas veces <strong>sea la gente de TI quienes tengan que configurar la vpn manualmente en cada equipo<\/strong> y no que el usuario haga <strong>selfservice<\/strong> siguiendo un manual. De la misma manera, como en el ejemplo que vamos a ver, si hubiera redes detr\u00e1s deberemos agregar los ruteos a mano.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Consejos&#8230; para la vida!<\/h2>\n\n\n\n<p>Antes de empezar tomemos nota de todo. Creemos un diagrama, agendemos ips p\u00fablicas, privadas y las ips que vamos a usar para la comunicaci\u00f3n interna de la VPN (10.0.0.0\/24). <\/p>\n\n\n\n<p>En el gr\u00e1fico navide\u00f1o est\u00e1 bien detallado.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Datos de cada nodo<\/h2>\n\n\n\n<p>Estos datos no son reales, son de un entorno emulado y con el prop\u00f3sito de crear el lab.<\/p>\n\n\n\n<p><strong>Router1<\/strong><\/p>\n\n\n\n<p>IP P\u00fablica: <strong>192.168.122.200<\/strong><br \/>Endpoint Port: <strong>9928<\/strong><br \/>Public Key<br \/><strong>kFagCslLeiYJ+Crh1xtJjZfhlrp6gdOKhwTLm\/p\/aQs=<\/strong><\/p>\n\n\n\n<p><strong>Router2<\/strong><\/p>\n\n\n\n<p>IP P\u00fablica: <strong>192.168.122.171 para los ansiosos&#8230; pero no importa!<\/strong><br \/>Endpoint Port: <strong>9928<\/strong><br \/>Public Key<br \/><strong>jGaVAxuq3IXqPomMxoWG3ZNDKcKe\/6eqR1XJ6Xgcln8=<\/strong><\/p>\n\n\n\n<p><strong>Router3<\/strong><\/p>\n\n\n\n<p>IP P\u00fablica: <strong>192.168.122.123 para los ansiosos&#8230; pero no importa!<\/strong><br \/>Endpoint Port: <strong>9928<\/strong><br \/>Public Key<br \/><strong>CNCPMGpXdxnPQ1V9nsGpt5vRv9PT8ssOQQffGUm\/nlQ=<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Configuraci\u00f3n Routers<\/h2>\n\n\n\n<p>Para no ser redundante voy a incluir las configuraciones gr\u00e1ficas solo del <strong>Router1<\/strong> y luego todas las configuraciones de consola. <\/p>\n\n\n\n<p>Doy por sentado que detr\u00e1s de cada router est\u00e1 configurada la red por dhcp (192.168.x.0\/24).<strong>La WAN de cada router es la ether1 y la LAN la ether2<\/strong>. La <strong>WAN<\/strong> tiene configuraci\u00f3n <strong>DHCP-Client <\/strong>y la LAN est\u00e1tica(obviamente). <\/p>\n\n\n\n<p>No configuro reglas de firewall pero si NAT para que salgan a internet los equipos que est\u00e1n detr\u00e1s.<\/p>\n\n\n\n<p><strong>Los pasos a seguir en Router1:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Nueva Interfaz Wireguard<\/strong> (Agendar Public Key y Puerto local del Endpoint)<\/li>\n\n\n\n<li><strong>Agregar IP Interfaz Wireguard <\/strong>reci\u00e9n creada<\/li>\n\n\n\n<li><strong>Configuraci\u00f3n de Peer<\/strong> (Como es Road Warrior <strong>no vamos a incluir informaci\u00f3n en el Endpoint<\/strong>, donde normalmente ir\u00eda la IP). <br \/>Agremos <strong>endpoint-port<\/strong>, <strong>Allowed Address<\/strong>(redes que van a pasar por el tunel) y<strong> Public Key<\/strong> (la del Router que va a conectar). <br \/>En <strong>Private key ponemos \u00abNone\u00bb,<\/strong> usar\u00e1 la Private Key que ya se configur\u00f3 en la interfaz<\/li>\n\n\n\n<li><strong>Agregar routeos<\/strong> para la red remota (\/ip\/route red de destino &#8211; Gateway (ip de vpn)).<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_1-1024x533.png\" alt=\"\" class=\"wp-image-1843\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_1-1024x533.png 1024w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_1-300x156.png 300w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_1-768x400.png 768w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_1.png 1267w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"812\" height=\"529\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_2.png\" alt=\"\" class=\"wp-image-1844\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_2.png 812w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_2-300x195.png 300w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_2-768x500.png 768w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"686\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_3-1024x686.png\" alt=\"\" class=\"wp-image-1845\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_3-1024x686.png 1024w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_3-300x201.png 300w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_3-768x514.png 768w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_3.png 1393w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"669\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_4-1024x669.png\" alt=\"\" class=\"wp-image-1846\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_4-1024x669.png 1024w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_4-300x196.png 300w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_4-768x502.png 768w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/router1_4.png 1179w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Les dejo la configuraci\u00f3n Completa:<br \/><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>#Interfaz para la VPN\n\/interface wireguard\nadd comment=WG listen-port=9928 mtu=1420 name=wg1\n#Configuraci\u00f3n de DHCP\n\/ip pool\nadd name=dhcp_pool0 ranges=192.168.10.2-192.168.10.254\n\/ip dhcp-server\nadd address-pool=dhcp_pool0 interface=ether2 name=dhcp1\n\n#El peeer!!! (o los peers)\n\/interface wireguard peers\nadd allowed-address=10.0.0.0\/24,192.168.20.0\/24,192.168.10.0\/24 comment=\\\n    aRouter2 endpoint-port=9928 interface=wg1 name=peer1 public-key=\\\n    \"jGaVAxuq3IXqPomMxoWG3ZNDKcKe\/6eqR1XJ6Xgcln8=\"\nadd allowed-address=10.0.0.0\/24,192.168.10.0\/24,192.168.30.0\/24 comment=\\\n    aRouter3 endpoint-port=9928 interface=wg1 name=peer2 public-key=\\\n    \"h0BQzoGOFpxD6\/0eNvQEEd1\/Puy56F3XvyQr7lOShgM=\"\n#Todas las ips\n\/ip address\n#LAN\nadd address=192.168.10.1\/24 comment=LAN interface=ether2 network=192.168.10.0\n#Punto de VPN local\nadd address=10.0.0.1\/24 comment=WG interface=wg1 network=10.0.0.0\n#WAN\n\/ip dhcp-client\nadd interface=ether1\n#La otra parte del DHCP\n\/ip dhcp-server network\nadd address=192.168.10.0\/24 gateway=192.168.10.1\n#NAT\n\/ip firewall nat\nadd action=masquerade chain=srcnat out-interface=ether1\n#Routas a los peer\n\/ip route\nadd disabled=no distance=1 dst-address=192.168.20.0\/24 gateway=10.0.0.2 \\\n    routing-table=main scope=30 suppress-hw-offload=no target-scope=10\nadd disabled=no dst-address=192.168.30.0\/24 gateway=10.0.0.3 routing-table=\\\n    main suppress-hw-offload=no\n\/system identity\nset name=Router1<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/arbol_redes.png\"><img loading=\"lazy\" decoding=\"async\" width=\"953\" height=\"897\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/arbol_redes.png\" alt=\"\" class=\"wp-image-1848\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/arbol_redes.png 953w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/arbol_redes-300x282.png 300w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/arbol_redes-768x723.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Routers 2 y 3<\/h2>\n\n\n\n<p>Para los routers clientes va la configuraci\u00f3n de Wireguard nada m\u00e1s, todo lo dem\u00e1s repite como en el primero.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/interface wireguard\nadd comment=WG listen-port=9928 mtu=1420 name=wireguard1\n\n\/interface wireguard peers\nadd allowed-address=10.0.0.0\/24,192.168.10.0\/24,192.168.30.0\/24 \\\n    endpoint-address=192.168.122.200 endpoint-port=9928 interface=wireguard1 \\\n    name=peer1 public-key=\"kFagCslLeiYJ+Crh1xtJjZfhlrp6gdOKhwTLm\/p\/aQs=\"\n\/ip address\nadd address=10.0.0.3\/24 comment=WG interface=wireguard1 network=10.0.0.0\n\/ip dhcp-client\nadd interface=ether1\n\n\/ip firewall nat\nadd action=masquerade chain=srcnat out-interface=ether1\n\n\/ip route\nadd dst-address=192.168.10.0\/24 gateway=10.0.0.1\n\/system identity\nset name=Router3<\/code><\/pre>\n\n\n\n<p><strong>Router2<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/interface wireguard<br \/>add comment=WG listen-port=9928 mtu=1420 name=wg1<br \/><br \/>\/interface wireguard peers<br \/>add allowed-address=10.0.0.0\/24,192.168.10.0\/24,192.168.20.0\/24 \\<br \/>endpoint-address=192.168.122.200 endpoint-port=9928 interface=wg1 name=\\<br \/>peer1 public-key=\"kFagCslLeiYJ+Crh1xtJjZfhlrp6gdOKhwTLm\/p\/aQs=\"<br \/>\/ip address<br \/>add address=10.0.0.2\/24 comment=WG interface=wg1 network=10.0.0.0<br \/><br \/>\/ip firewall nat<br \/>add chain=srcnat out-interface=ether1<br \/>add action=masquerade chain=srcnat out-interface=ether1<br \/><br \/>\/ip route<br \/>add disabled=no distance=1 dst-address=192.168.10.0\/24 gateway=10.0.0.1 \\<br \/>routing-table=main scope=30 suppress-hw-offload=no target-scope=10<br \/>\/system identity<br \/>set name=Router2<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Diferencias con Site to Site<\/h2>\n\n\n\n<p>La gran diferencia entre la <strong>VPN Road Warrior<\/strong> y<strong> Site to Site <\/strong>en <strong>Wireguard<\/strong> es que, en los clientes solamente, pondremos la IP del router que actuar\u00e1 de Server en el campo <strong>Endpoint<\/strong>. <\/p>\n\n\n\n<p>En el server (porque espera a cualquier cliente) no pondremos ning\u00fan <strong>endpoint<\/strong>. Esto har\u00e1 que la <strong>VPN funcione a\u00fan detr\u00e1s de un NAT<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_cliente.png\"><img loading=\"lazy\" decoding=\"async\" width=\"546\" height=\"683\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_cliente.png\" alt=\"\" class=\"wp-image-1853\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_cliente.png 546w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_cliente-240x300.png 240w\" sizes=\"auto, (max-width: 546px) 100vw, 546px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_Router.png\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"679\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_Router.png\" alt=\"\" class=\"wp-image-1854\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_Router.png 595w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/endpoint_Router-263x300.png 263w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Y desde mi IPhone y desde Windows? como me conecto?<\/h2>\n\n\n\n<p>Wireguard corre en casi cualquier sistema operativo. Las siguientes  im\u00e1genes est\u00e1n tomadas desde la documentaci\u00f3n oficial: <a href=\"https:\/\/help.mikrotik.com\/docs\/spaces\/ROS\/pages\/69664792\/WireGuard\">https:\/\/help.mikrotik.com\/docs\/spaces\/ROS\/pages\/69664792\/WireGuard<\/a> donde explica claramente lo mismo que te explico en este post.<\/p>\n\n\n\n<p>Para instalarlo en tu equipo o tu iphone, siguiendo el ejemplo de nuestro laboratorio, tu Iphone ser\u00eda el <strong>Router2<\/strong> y deber\u00edamos poner en la configuraci\u00f3n:<br \/><strong>Address<\/strong>: 10.0.0.2<br \/><strong>Public Key:<\/strong> lSvF97ANzXwS3DMRIHrnXQT+za+4bnXZC3Yx2lrmlSI=<br \/><strong>Endpoint:<\/strong> 192.168.122.200:9928<br \/><strong>Allowed Ips:<\/strong> Est\u00e1 correcto en la imagen 0.0.0.0\/0 se refiere a todo.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4393.png\"><img loading=\"lazy\" decoding=\"async\" width=\"428\" height=\"927\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4393.png\" alt=\"\" class=\"wp-image-1855\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4393.png 428w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4393-139x300.png 139w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4394.png\"><img loading=\"lazy\" decoding=\"async\" width=\"428\" height=\"927\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4394.png\" alt=\"\" class=\"wp-image-1856\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4394.png 428w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4394-139x300.png 139w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4396.png\"><img loading=\"lazy\" decoding=\"async\" width=\"428\" height=\"927\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4396.png\" alt=\"\" class=\"wp-image-1857\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4396.png 428w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/IMG_4396-139x300.png 139w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/a><\/figure>\n\n\n\n<p>En <strong>Windows<\/strong>, bajamos el cliente desde: <a href=\"https:\/\/download.wireguard.com\/windows-client\/\">https:\/\/download.wireguard.com\/windows-client\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/Wireguard_Windows.png\"><img loading=\"lazy\" decoding=\"async\" width=\"828\" height=\"648\" src=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/Wireguard_Windows.png\" alt=\"\" class=\"wp-image-1858\" srcset=\"https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/Wireguard_Windows.png 828w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/Wireguard_Windows-300x235.png 300w, https:\/\/www.nerdadas.com\/blog\/wp-content\/uploads\/2025\/12\/Wireguard_Windows-768x601.png 768w\" sizes=\"auto, (max-width: 828px) 100vw, 828px\" \/><\/a><\/figure>\n\n\n\n<p>Presionamos en \u00abImport tunnel\u00bb y el archivo que importamos deber\u00eda contener algo como lo siguiente<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Interface] \nPrivateKey = tuclave, esta a nadie le interesa mas que a vos \nAddress = 10.0.0.2\/24 \nDNS = 10.0.0.1 \n&#91;Peer] \nPublicKey = lSvF97ANzXwS3DMRIHrnXQT+za+4bnXZC3Yx2lrmlSI= \nAllowedIPs = 0.0.0.0\/0 \nEndpoint = 192.168.122.200:9928<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusi\u00f3n<\/h2>\n\n\n\n<p>Si bien <strong>Wireguard<\/strong> es una red de despliegue r\u00e1pido con pocas configuraciones no tiene a\u00fan el dinamismo para que sea el propio usuario qui\u00e9n haga las configuraciones correspondientes. Tampoco admite <strong>2FA<\/strong> ni tiene integraci\u00f3n con usuario y clave de un server de identidad centralizado.<\/p>\n\n\n\n<p>Que <strong>Wireguard<\/strong> soporte el modo <strong>Road Warrior<\/strong>, a mi parecer, <strong>no la hace la mejor opci\u00f3n para este tipo de VPN<\/strong>. Recomendar\u00eda que uses <strong>OpenVPN<\/strong> en estos casos ya que tiene mucha m\u00e1s integraci\u00f3n y est\u00e1 especificamente dise\u00f1ada para funcionar de esta manera.<\/p>\n\n\n\n<p>Sin embargo, <strong>Wireguard<\/strong> es una <strong>VPN<\/strong> de las m\u00e1s f\u00e1ciles de implementar y con muy <strong>poco overhead<\/strong>, lo que la hace extremadamente \u00fatil.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lleg\u00f3 la navidad y es hora de armar el arbolito. En otro momento escrib\u00ed un post explicando como conectar una VPN Site to Site con Wireguard. (https:\/\/www.nerdadas.com\/blog\/vpn-site-to-site-con-wireguard\/). Esta vez es una VPN Road Warrior, algo que va mejor en una empresa donde sus empleados se conectan a la sucursal central remotamente a diario. Las interfaces [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1841,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1243,1223,161,1,17,804],"tags":[228,229,10,37,1230,242,1411,1410,569,1407,1409,869,818,46,1412,270,1408,1316],"class_list":["post-1840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-montando-tu-red-corporativa-de-0","category-redes","category-seguridad","category-sin-categoria","category-tecnologia","category-ti","tag-client","tag-cliente","tag-jeremias-palazzesi","tag-linux","tag-mikrotik","tag-network","tag-private-key","tag-public-key","tag-redes","tag-road","tag-road-warrior","tag-seguridad","tag-server","tag-servidor","tag-tech","tag-tecnlogia","tag-warrior","tag-wireguard"],"_links":{"self":[{"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/posts\/1840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/comments?post=1840"}],"version-history":[{"count":7,"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/posts\/1840\/revisions"}],"predecessor-version":[{"id":1862,"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/posts\/1840\/revisions\/1862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/media\/1841"}],"wp:attachment":[{"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/media?parent=1840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/categories?post=1840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nerdadas.com\/blog\/wp-json\/wp\/v2\/tags?post=1840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}