background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "WireGuard : le VPN nouvelle génération !"

input logo icon
Video tags
|

Video tags

Informatique
High-Tech
Tutoriel
VPN
WireGuard
Debian 11
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:00
[Music]
00:00:04
hi everyone and florian da and icon is
00:00:07
today I'm going to talk to you about VPN
00:00:09
and more precisely about wire garde so
00:00:12
it's a relatively
00:00:15
recent and modern VPN solution and which is much
00:00:18
lighter and faster than the other
00:00:21
solutions that we know like openvpn
00:00:24
or ip sec so I will give you a little
00:00:26
presentation of hoyaux look and then
00:00:29
after there will be a
00:00:31
demonstration phase based on a
00:00:33
debian machine for the linux part and then
00:00:35
with a station also under windows
00:00:37
rose without further ado I suggest that
00:00:40
we move on to the first part of the
00:00:42
video but off before that it is
00:00:43
absolutely necessary that you subscribe to the
00:00:46
youtube channel haiti knows
00:00:50
so royals look what is it well
00:00:52
it is a vpn solution relatively
00:00:54
modern relatively recent since the
00:00:56
first stable version was published in
00:00:59
March 2001 and it also has the honor
00:01:01
of being integrated into the Linux kernel since
00:01:04
version 5.6 which also proves
00:01:06
that there is a certain enthusiasm for
00:01:09
this solution is a certain
00:01:11
confidence that they are integrated
00:01:12
directly at the level of the Linux kernel
00:01:15
even if we can find it on
00:01:18
slightly older distributions which
00:01:21
do not use at least the verb the
00:01:23
Linux kernel in version 5.6 so how does
00:01:27
it work and well does it work
00:01:29
authentication with an exchange of
00:01:31
keys so the public private keys which
00:01:33
are managed on each side there is an
00:01:35
exchange of keys which is carried out between the
00:01:37
two others for authentication in
00:01:40
fact a bit on the same principle as
00:01:41
authentication by key when you
00:01:44
connect with ssh for example why are
00:01:48
garde is a solution that works in
00:01:49
peer to peer mode so we will say
00:01:51
point to point connection and not
00:01:54
a client server relationship as
00:01:57
can be the case with openvpn or ip sec
00:02:00
to cite here are the two
00:02:03
major alternatives that we see that we come across
00:02:05
today in business or even at
00:02:08
home if we want to set up a
00:02:10
VPN flock to look of course at a
00:02:12
secure solution and for the
00:02:14
cryptographic part several algorithms
00:02:16
are used we have in particular the chacha
00:02:19
20 for symmetric encryption and the
00:02:22
poly 13 05 for slow authentication
00:02:25
of messages exchanged between the two
00:02:28
others so that there are five or six
00:02:29
algorithms like that which are used
00:02:31
by royals look we cannot not
00:02:34
change them in fact they are they are anchored
00:02:37
we will say in the functioning of the
00:02:38
software to choose its algorithms it
00:02:41
was here handpicked there were
00:02:44
different audits which were
00:02:46
carried out to ensure that the security
00:02:48
was sufficient and there are
00:02:51
also security researchers
00:02:54
there who worked on the subject to
00:02:57
ensure that wire garde was a
00:02:58
secure solution because we know that
00:03:01
when we set up a VPN and
00:03:04
the encryption of the exchanges is
00:03:07
relatively important so royan
00:03:09
look it's simple light and ultra
00:03:10
efficient that's what I noted on
00:03:12
the screen so why quite simply
00:03:14
already simple because you will see
00:03:17
that it is based on authentication
00:03:18
by key so it's is relatively easy to
00:03:21
set up lightweight because they
00:03:24
work DP problems moreover it does
00:03:26
not support TCP so it can be
00:03:28
annoying sometimes to get through
00:03:29
certain firewalls but the fact of
00:03:32
relying on udp a wish that this is
00:03:34
more fluid, simpler to
00:03:36
initialize the connection but it is
00:03:39
also lighter in the sense that its
00:03:42
source code, which is accessible, is only about
00:03:44
four thousand,
00:03:46
4000 and a few lines of code which
00:03:48
is really very little,
00:03:50
particularly in comparison of other
00:03:52
solutions on the market have nine several
00:03:54
hundred thousand lines of code
00:03:56
so why are garde supports
00:03:58
ipv4 ipv6 as well and finally it is multi os
00:04:03
i.e. it can be installed on
00:04:04
windows on linux on mac os there is even
00:04:06
a version for bsd on ios and android
00:04:10
it's the same we can use it so
00:04:12
there it is really multiplatform
00:04:14
that's rather rather cool and it has
00:04:17
even been used since the end of 2021 since
00:04:20
October I believe by proton vpn so
00:04:23
proton vpn which is directly linked to
00:04:27
the Swiss company so behind proton
00:04:29
mail so it is integrated into proton vpn
00:04:32
so what is missing slow which shows
00:04:34
again that there is a real enthusiasm
00:04:36
a real interest towards this
00:04:39
solution and then for those who have
00:04:41
a router with openwrt at home
00:04:44
so the ol we are going to say customize that we
00:04:48
can install on certain routers and
00:04:50
also know that wire garde is
00:04:52
supported so now we are going to
00:04:54
spend a little bit discovering the
00:04:55
lab we are going to see what we are going to set
00:04:57
up today and we will then move
00:04:58
on to the demonstration
00:05:01
so to set up voyeur
00:05:03
gain we can imagine a
00:05:06
classic operation a sort of
00:05:08
client vpn also where we have a pc that
00:05:12
has the client sent with regard to which will
00:05:14
connect to a Horoya server
00:05:17
distant view even if they rather
00:05:18
spoke of royal peace look since
00:05:20
ultimately there is no
00:05:21
client server relationship but we will have a pc
00:05:24
which will connect to a violation
00:05:25
as we would do
00:05:28
with a classic vpn openvpn for
00:05:32
example then in the case where we set
00:05:34
up why look on a debian
00:05:37
rose machine as we are going to do today and
00:05:39
not directly on a router
00:05:41
well it will be necessary think about doing
00:05:43
port redirection at the
00:05:45
router level for example on port 51 1820
00:05:48
which is the default port used by
00:05:50
wire yards so that the flow is
00:05:52
redirected towards the wire server watch
00:05:55
only there so that the connection can be
00:05:57
established then in what concerns what
00:05:59
we are going to do today here is
00:06:01
really the diagram of the lab so here one
00:06:05
is me the worst one with my PC under
00:06:08
Windows with my network due to home
00:06:11
so in 192 168 points 1.0 really a
00:06:14
very classic network to when we have
00:06:16
a box at home I will use
00:06:19
the network 192 points 168 points 110
00:06:22
points 0 slash 24 for the tunnel wire
00:06:25
guard and my PC will have the interface in
00:06:28
points 2 and there the remote server
00:06:31
the interface in points 121 because it
00:06:34
already has an IP in 100 points 121 for their
00:06:38
corporate network where
00:06:40
other servers are also located so on the
00:06:42
network 192 168 points 100 points 0 then
00:06:47
with royal look you have to keep in
00:06:48
mind that each machine must have an
00:06:50
ip address on a vpn interface
00:06:54
in quotes and this ip address
00:06:56
must be defined statically there
00:06:59
is no automatic assignment of
00:07:02
the ip address like on an openvpn vpn
00:07:05
for example so it is a small
00:07:07
inconvenience but that's part of the
00:07:09
operation of two jewels
00:07:12
so look for the demonstration and well we
00:07:13
will start by configuring
00:07:15
the debian host a little bit after we will come to the
00:07:18
windows machine and we will have to return
00:07:20
to the debian to finalize the
00:07:22
configuration in particular for declared
00:07:25
l remote host and then after we will do
00:07:27
some tests to check that everything
00:07:29
works so if you are ready
00:07:30
now all that remains is to go
00:07:33
to the demo
00:07:35
to start with the installation of
00:07:38
fog guard on the debian
00:07:39
11 machine and well we must first
00:07:42
update the cash of the packages then we will
00:07:44
simply do a Swedish peter
00:07:45
get install hoyaux simply look
00:07:48
to install the pac is
00:07:51
necessary so I will already
00:07:53
installed and it does not need to be updated
00:07:55
day no it's perfect then what we
00:07:57
need to do is suddenly generate
00:08:01
a pair of public private keys
00:08:03
which we can then use at the
00:08:05
level of this machine for
00:08:07
authentication with the 'other distance
00:08:10
so this is done with the command wg jen
00:08:13
which is wg pop which so here we will generate
00:08:17
two dwg files draw private point
00:08:19
which is the wg which republic points which
00:08:22
in the folder the tc wire keeps so there
00:08:26
we have the public key which is displayed on
00:08:29
the screen and we will have to
00:08:31
recover the content of the
00:08:34
private key to indicate it in the
00:08:36
configuration file that we will create just
00:08:38
after we simply make a private cat wg
00:08:41
have point which is slow to the
00:08:44
value of the private key of my
00:08:46
host world so that obviously it is a value
00:08:48
really which must be kept
00:08:49
confidential and not
00:08:52
communicated to anyone
00:08:55
it is only the public key we
00:08:57
communicate to the other remote who must
00:08:59
connect then this private key well
00:09:02
we are going to copy its value into a
00:09:04
file that we are going to create immediately
00:09:06
from below to remove its flock from the
00:09:08
look so there I uses nano as
00:09:10
an editor and we see the pwg 0 points
00:09:13
against like that it will make it possible to create
00:09:15
in fact a wire guard interface which
00:09:18
will be called wg 0 a bit on the same
00:09:21
principle that we often do at thg
00:09:23
euros by example so here we are going to create a
00:09:25
block which will be called interface to
00:09:28
declare the flock interface in view
00:09:32
so we will then add different
00:09:34
properties firstly the
00:09:36
address property and there we will put the ip address
00:09:39
of the wire interface so I
00:09:42
remind you that it is this IP address there
00:09:44
once it is done we go to the
00:09:46
line have made a save config equal under
00:09:49
to activate this option which will
00:09:51
allow us in some way to
00:09:52
lock the config file that is to
00:09:54
say that when we go
00:09:56
when we activate the wire
00:09:59
guard interface well we will no longer be able to modify this
00:10:02
file since when we stop
00:10:04
the interface it will be overwritten with the
00:10:07
possible values ​​that we could not have
00:10:08
injected live so to modify this
00:10:11
file there you will have to stop the interface
00:10:13
modify the file is restarted
00:10:15
the interface so that is linked to this
00:10:18
little option the port of the elbows so
00:10:20
listen port equals so here I am going to
00:10:23
take the default port 50 and 1,820
00:10:26
but I of course authorize you to
00:10:28
use something else and finally we are going to
00:10:29
make a private which equals and there we are going to
00:10:32
paste the value of the private key
00:10:34
that we had
00:10:37
that we recovered just before once
00:10:40
that it's done and well save this
00:10:41
file and we're going to come and do another
00:10:44
command csu of water wg pull quik up to
00:10:49
go up and the name of the interface wg 0
00:10:52
so there it tells us that it has good it has
00:10:55
good mounted the interface besides if I
00:10:57
do an ip to on my machine I can see
00:11:00
here that I have a new
00:11:03
point to point network interface with the ip address 192 168
00:11:08
points 110 points 121 I could
00:11:12
also do a south to wg so hot wg 0 and
00:11:17
there it really puts me in touch with the state of
00:11:19
the interface but by going to check
00:11:21
directly with doyer see if we
00:11:23
want the ria interface to start
00:11:25
automatically when we restart
00:11:26
the debian machine it so you have to
00:11:29
activate its startup in this way wg
00:11:32
pull quick @ and the name of the interface
00:11:35
for a service like that, it will
00:11:38
start automatically
00:11:39
every time I restart my
00:11:42
debian 11 machine now that we have
00:11:44
configured royal look on this high
00:11:47
we have to go a little
00:11:48
further in the configuration of the
00:11:50
debian 11 machine in the sense that the focal points play
00:11:53
the role of routers since it must
00:11:55
allow my windows machine which is
00:11:58
remote to access the other machines
00:12:01
on the LAN in particular the servers which are
00:12:04
connected to this same lanouf for this we
00:12:06
must activate different
00:12:07
functions in debian so that
00:12:10
the system is able to do
00:12:11
routing that we will modify the file if
00:12:14
it was such a point that we do and at
00:12:16
the very end we will add this option
00:12:18
ip forward to 1 to activate the leap and
00:12:22
cold we on the distribution on the
00:12:25
distribution of the ranges then we will
00:12:27
have to activate lippé masquerade
00:12:30
basically it's is a bit like nat but
00:12:32
at level 2 the debian machine to
00:12:35
allow transit packets and
00:12:37
correctly between my windows pc and
00:12:41
the remote lan so that's the same
00:12:43
it's essential if you want to
00:12:46
allow the access like that to an
00:12:47
offense to do that you will have to
00:12:50
configure the local firewall of the
00:12:54
machine I am going to go through
00:12:57
the uaf w because I like this little
00:12:59
this little utility which allows you to
00:13:01
configure
00:13:02
the firewall fire therefore frozen already installed on
00:13:06
the machine but here is the command to
00:13:07
install it and then so if you
00:13:10
have not yet installed or configured it at all,
00:13:12
think very strongly first of all
00:13:14
about creating a first rule to
00:13:17
authorize the port 22 years tcp that's
00:13:20
to keep control in ssh on the
00:13:23
debian machine because otherwise if you
00:13:25
don't follow this rule we activate
00:13:27
the firewall you will cut off
00:13:29
access to your vn so it's a bit of
00:13:31
a shame you just have to think about
00:13:33
modifying the 22 by the Matthews port
00:13:35
used to let it know once
00:13:39
it's done and well we also see
00:13:40
authorizing another port it's port 51
00:13:43
1820 udp which corresponds to wire grade there
00:13:47
he tells me that the rule already exists because
00:13:49
indeed I had I had
00:13:51
prepared the work a little bit and is
00:13:54
this demo so then we have to
00:13:56
go and modify another file
00:13:58
so first of all we have to
00:13:59
recover the name of the network card
00:14:03
which is used by the debian machine
00:14:05
to access the remote lan
00:14:07
that is to say the network 192 168 points
00:14:11
without point x in this case here I
00:14:14
see that these ems 192 so that is is the
00:14:17
name of my interface now I'm
00:14:18
going to modify
00:14:20
a file in a f w which is called
00:14:23
before point Russian here and in this
00:14:26
file in fact we will be able to
00:14:28
manage the firewall rules of
00:14:31
certain channels in particular the channel
00:14:33
for war is what we are going to do
00:14:35
first of all is go to the very end to
00:14:37
activate what we call lippé
00:14:39
masquerade is therefore this ip will mask 10
00:14:43
assets in this way and we clearly specify
00:14:45
here the name of the interface so you
00:14:47
see I put back the n s 192 and there we are
00:14:50
really going to act at the level of the
00:14:52
post routing chain of the machine that is
00:14:55
really essential for the whole
00:14:58
routing part of
00:15:00
the other debian is not directly
00:15:02
linked to wire keep ultimately but it is
00:15:05
essential so that we can access
00:15:07
our network remotely so we must
00:15:10
add that is a little bit higher
00:15:13
here we are going to position it there so that it is
00:15:15
logical to find it at the level
00:15:18
of the itie of the fw before for world we must
00:15:22
declare the networks we will say
00:15:25
trusted which will be able to transit
00:15:29
at the level of the mat rules and all
00:15:31
that is there so we will specify the
00:15:33
network my remote lan and the network of
00:15:37
the network of tunnel vpn core look we
00:15:41
could also and the place of that if I
00:15:44
want to authorize the vpn tunnel and
00:15:46
only a remote server not or
00:15:48
access to all we could specify instead of the
00:15:50
place of 100 points 0.20
00:15:53
to be 100 points 11 for example h 30 two
00:15:56
to specify only one machine one
00:16:00
machine once it's done and although we
00:16:02
save durable here we can close
00:16:04
the file now it will remain
00:16:08
low for us to activate the firewall first of all
00:16:11
therefore to that of unef w enable so
00:16:16
there it asks me if I want to reload the
00:16:18
confie so I say yes and then I
00:16:21
will do a follow-up to the system control
00:16:24
restart usw to really reload be
00:16:28
sure that the conf is well and truly activated
00:16:31
and well started so once that
00:16:34
's done we're going to say that for the moment
00:16:36
the debian machine is almost
00:16:39
configured to go to 90% we
00:16:42
just need to go to the
00:16:44
windows rose machine that we install royal
00:16:47
see that we configure voyeur keeps
00:16:49
that we recover the public key
00:16:52
that they have just added on the
00:16:54
debian machine for which a
00:16:56
mutual approval does so much in
00:16:59
both directions at the level of the two machines
00:17:01
so that is very important so we will
00:17:03
now go through the configuration of the
00:17:04
Windows machine
00:17:06
[Music]
00:17:07
on the official website of wire garde you
00:17:10
can download the installer or even 1
00:17:14
and messi for windows knowing that after
00:17:16
you just have to run it and install
00:17:18
itself I I really have nothing to do
00:17:19
so it's really super simple
00:17:22
then in a window like this we
00:17:24
will appear on the screen and therefore
00:17:27
within this window we will create
00:17:28
a tunnel so we will click here on the
00:17:30
little arrow added a life tunnel
00:17:32
when we are going to do that in fact it will
00:17:36
automatically generate a pair of
00:17:39
public private keys here we have the value of
00:17:41
the public key and here we have it at
00:17:44
the interface which is declared with the
00:17:47
private key so it will we will need to
00:17:49
presently when we retrieve the public t value
00:17:51
here and we have it declared
00:17:54
on the debian server to declare and
00:17:57
finally this new connection point
00:18:00
when we start by making
00:18:02
the declared address of this interface
00:18:05
so we put havrais segal and there I will
00:18:07
put 192 168 points 110 points 2
00:18:11
slash 24 to correspond to the diagrams
00:18:13
that I had initially imagined then
00:18:17
we must collomb declare the
00:18:20
remote connection point, that is to say the
00:18:22
machine debian for that we are going to create a
00:18:25
new block which is called worst and
00:18:27
inside we are going to indicate several
00:18:29
properties first of all public is equal
00:18:32
and there we are going to go and recover on the other
00:18:35
debian the value of the key lacquered public
00:18:38
that will be in this folder there and we will
00:18:41
resume here this time the wg we will
00:18:44
retrieve the value here which is here
00:18:47
like these and we will come and
00:18:51
position it so to send a look I
00:18:54
paste this value here then we will
00:18:57
add a directive additional
00:19:00
of which it is this one that allows you to
00:19:02
roughly declare the IP addresses or the
00:19:06
networks for which it is necessary
00:19:07
to go through the wire tunnel so keep
00:19:10
there what I am going to do its 192,168
00:19:13
points 100 points
00:19:15
0.24 since it 'is my lan
00:19:18
mom remote lan williams and server
00:19:21
which I really want to access and we
00:19:23
will also put the direction 10.0 since
00:19:26
it is my VPN tunnel have the same
00:19:29
windows machine it is that when she wants to
00:19:30
reach her two networks there it must
00:19:32
go through the tunnel if we want the whole
00:19:34
flow to pass through the tunnel voyeur
00:19:36
guiral it is necessary here m 15 00 finally 4 x 0
00:19:42
this I have zero for really that everything
00:19:44
passes in then they will be made to be
00:19:46
endpoint and we will have to specify
00:19:49
the remote ip address of the debian so
00:19:54
here we will put the public ip address in
00:19:56
fact and then thanks to
00:19:58
port forwarding it will reach the
00:20:01
debian hong kong host but the ip address or the
00:20:03
domain name and we put a colon the
00:20:05
number 2 for 51
00:20:08
1820 here we have to put a name or
00:20:10
a bep thwala vpn quite simply we
00:20:13
click on save but before that
00:20:15
we are going to copy the public key is here and
00:20:19
validate it so there I have well my
00:20:21
configuration finally my tunnel which is
00:20:23
declared here now what we will have to
00:20:26
do and well returned to
00:20:29
the debian machine to declare the father
00:20:32
therefore the connection point as we
00:20:34
did in fact on the windows machine
00:20:37
so I I'm going to return here except that
00:20:39
this time what I'm going to
00:20:41
do is stop
00:20:43
the interface already
00:20:45
wg 0 to be able to modify it,
00:20:48
then I'm going to modify the configuration file
00:20:52
from earlier wg 0 points against and
00:20:56
there it's a bit the same I'm going to add
00:20:57
a block called worst like this I
00:21:00
go inside this blog created a
00:21:02
value called public which equals and
00:21:05
there I put the value that I retrieved
00:21:07
on my windows host there in the same way
00:21:10
we tell him while lurking when
00:21:12
should he use this tunnel in
00:21:14
this case it is only to
00:21:15
communicate with my machine
00:21:18
well windows machines so I take
00:21:20
care of them loose 32 because
00:21:23
the debian night it must communicate in
00:21:25
this tunnel only to exchange with my
00:21:27
windows machine and only with it
00:21:31
once that is done well we
00:21:32
save closed there we will restart
00:21:34
the interface
00:21:37
with a widower restart the interface is
00:21:39
good to make testino one last
00:21:40
thing to do is modify the rights
00:21:42
on the wire folder look at all the
00:21:44
account files which are behind
00:21:46
in particular the key files for which
00:21:48
is that the user route that they
00:21:50
are able to 'go read them and
00:21:53
possibly modify them
00:21:55
once it's done all that remains is to
00:21:56
test our vpn wire tunnels keeps
00:22:00
to test the tunnel and thank you very
00:22:03
simply we take the average customer looks
00:22:04
at the level of the windows machine and we
00:22:06
click on active and so once
00:22:08
its activated like that it will not necessarily
00:22:11
mean that it works I have already seen cases
00:22:13
where it did not work in this case you
00:22:15
have to go to the log tab here
00:22:17
to see a little bit now what we
00:22:18
can do is try to ping
00:22:20
and communicate through the
00:22:21
travel VPN network look at me what I'm going to
00:22:24
do forward disconnected my openvpn
00:22:26
since I had an openvpn which
00:22:28
allowed me to access the remote infra
00:22:30
and in particular to the debian machine that
00:22:33
I administered here so we see that
00:22:35
I lost the connection I have my
00:22:38
why are guard tunnel which is mounted and so I
00:22:40
will I will simply take the
00:22:43
powershell console I I'm going to make a pin
00:22:45
already on my debian wire interface
00:22:49
so look at the 110 points 121 to see
00:22:52
if it responds so we can already see that
00:22:53
it responds so that means
00:22:56
that my tunnel is operational and I can
00:22:58
communicate with my host with my
00:23:00
debian host is now 6 pin
00:23:02
100.1 which is my server in
00:23:04
fact in my remote infrastructure we can
00:23:07
also see that it works
00:23:10
normally even at the level of the
00:23:11
debian machine here and well if I try to
00:23:14
reconnect and well this time it
00:23:16
should work by going through the
00:23:18
voyeur tunnel look here what is
00:23:20
good what is the case so we can
00:23:22
see that it works very well
00:23:27
the seeing tunnel look now in
00:23:30
place you have a lot of information for the
00:23:33
do also on your side and I made
00:23:35
a really super complete tutorial which
00:23:37
covers all the
00:23:40
commands and all that to find it
00:23:41
on haiti connect point fr etc.
00:23:44
allows you to go over all that at your
00:23:45
leisure in addition to this video in
00:23:49
in any case I thank all those who
00:23:50
followed it in terms of the throughput tests
00:23:53
that I was able to do hoyau look they
00:23:55
really show much more because
00:23:56
forming would say a six or seven times
00:23:59
faster in terms of throughput especially on
00:24:02
file transfers via via the
00:24:04
smb protocol so there is really a
00:24:07
huge difference at level 2 from this
00:24:10
point of view it is really
00:24:11
faster in terms of speed but also in
00:24:14
terms of speed when it comes to
00:24:16
two rises the connection raise the
00:24:19
vpn connection finally therefore to all this
00:24:22
which is really appreciable and which
00:24:25
shows clearly that wire take a good look at these
00:24:28
lighter more efficient as I
00:24:31
said in the introduction if this video
00:24:34
was able to you do not hesitate to leave a
00:24:36
little comment to share it and al
00:24:38
ahly quai and then we'll meet again
00:24:39
quickly for the rest
00:24:42
[Music]

Description:

WireGuard est un VPN moderne, plus rapide qu'OpenVPN et IPSec ! Dans cette vidéo, nous allons apprendre à la configurer sur une machine Debian 11 afin d'accéder à une infrastructure distante (client-to-site) depuis une machine Windows 11 ! Explications en français. ⭐ Sommaire 00:00 Introduction 00:47 Découverte de WireGuard 05:00 Lab WireGuard du jour ! 07:33 Configuration WireGuard Debian 11 17:05 Configuration d'un tunnel WireGuard sous Windows 21:59 Test du tunnel VPN WireGuard 23:24 Conclusion Tutoriel associé à cette vidéo : 📌 - https://www.it-connect.fr//mise-en-place-de-wireguard-vpn-sur-debian-11/ Site officiel WireGuard 📌 - https://www.wireguard.com/ Pense à t'abonner pour ne rien manquer : ⭐ https://www.youtube.com/c/It-connectFr/?sub_confirmation=1 ----- 📢🙍‍♂️ Auteur : Florian Burnel ----- ➡ Visitez notre site : https://www.it-connect.fr ➡ Suivez-nous sur les réseaux sociaux : Twitter : https://twitter.com/itconnect_fr Facebook : https://www.facebook.com/unsupportedbrowser Instagram : https://www.facebook.com/unsupportedbrowser LinkedIn : https://www.linkedin.com/company/it-connect-fr

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "WireGuard : le VPN nouvelle génération !" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "WireGuard : le VPN nouvelle génération !" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "WireGuard : le VPN nouvelle génération !" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "WireGuard : le VPN nouvelle génération !" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "WireGuard : le VPN nouvelle génération !"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "WireGuard : le VPN nouvelle génération !"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.