Changes

m
Fixed spacing/formatting
Line 84: Line 84:  
----While not mandatory, it is highly recommended to add a LAN IP reservation for the Helium miner to make sure port forward rule, which will be defined later, always points to the correct device. In order to do this, navigate to LAN "'''Network>LAN'''":
 
----While not mandatory, it is highly recommended to add a LAN IP reservation for the Helium miner to make sure port forward rule, which will be defined later, always points to the correct device. In order to do this, navigate to LAN "'''Network>LAN'''":
 
[[File:ToLAN.png|alt=|480x480px]]
 
[[File:ToLAN.png|alt=|480x480px]]
 +
 
Once there, scroll down to the static lease section and click “'''Add'''”:
 
Once there, scroll down to the static lease section and click “'''Add'''”:
 +
 
[[File:LANAddStatic.png|alt=|653x653px]]
 
[[File:LANAddStatic.png|alt=|653x653px]]
 +
 
Enter a desired '''hostname''' (can be name of the device) in order to name the reservation, then click on “'''MAC address'''” field and select the Helium miner. Finally, in “'''IP address'''” field keep currently assigned IP address or, if desired, enter a custom IP address.  
 
Enter a desired '''hostname''' (can be name of the device) in order to name the reservation, then click on “'''MAC address'''” field and select the Helium miner. Finally, in “'''IP address'''” field keep currently assigned IP address or, if desired, enter a custom IP address.  
 
[[File:StaticIPLAN.png|alt=|658x658px]]
 
[[File:StaticIPLAN.png|alt=|658x658px]]
 +
 
When done, scroll down to the bottom of the page and click “'''Save'''” to apply changes.
 
When done, scroll down to the bottom of the page and click “'''Save'''” to apply changes.
 +
      Line 139: Line 144:  
----<u>'''Important'''</u>'''!''' Pass-through and Bridge modes are disabled when multi-wan is enabled. To resolve this, navigate to "'''Network>WAN'''" before doing any additional configuration:  
 
----<u>'''Important'''</u>'''!''' Pass-through and Bridge modes are disabled when multi-wan is enabled. To resolve this, navigate to "'''Network>WAN'''" before doing any additional configuration:  
 
[[File:NavtoWAN.png|alt=|480x480px]]
 
[[File:NavtoWAN.png|alt=|480x480px]]
Once there, select interface with name “'''Mobile (WAN)'''” as your primary internet connection by selecting the circular button. Concurrently, make sure to deselect any other square box and then click on “'''Save'''” to apply configuration. The following image shows correct configuration:
+
 
[[File:WANcfgmobile.png|alt=|610x610px]]
+
Once there, select interface with name “'''Mobile (WAN)'''” as your primary internet connection by selecting the circular button. Concurrently, make sure to deselect any other square box and then click on “'''Save'''” to apply configuration. The following image shows correct configuration:[[File:WANcfgmobile.png|alt=|610x610px]]
    
===Configuring the passthrough mode on the RUT240===
 
===Configuring the passthrough mode on the RUT240===
 
----To proceed with further router configuration by navigating to "'''Network>Mobile'''" configuration page. Here, it will be possible to set passthrough mode to make our router forward all incoming traffic directly to the Helium miner.
 
----To proceed with further router configuration by navigating to "'''Network>Mobile'''" configuration page. Here, it will be possible to set passthrough mode to make our router forward all incoming traffic directly to the Helium miner.
 
[[File:ToMobile.png|alt=|444x444px]]
 
[[File:ToMobile.png|alt=|444x444px]]
 +
 
In this configuration page make sure to modify the following settings:
 
In this configuration page make sure to modify the following settings:
   Line 159: Line 165:     
Login to the router's WebUI and navigate to the LAN section ('''Network>LAN'''):
 
Login to the router's WebUI and navigate to the LAN section ('''Network>LAN'''):
 +
 
[[File:ToLAN.png|alt=|480x480px]]
 
[[File:ToLAN.png|alt=|480x480px]]
   Line 190: Line 197:  
===Preparing and setting up VM on VPS===
 
===Preparing and setting up VM on VPS===
 
----In this example Linode cloud environment is used for instructions. Begin the procedure by creating a VM on VPS. Once signed-in, click on "'''Create'''" and then choose "'''Linode'''":
 
----In this example Linode cloud environment is used for instructions. Begin the procedure by creating a VM on VPS. Once signed-in, click on "'''Create'''" and then choose "'''Linode'''":
[[File:LinodeCreate.png|alt=|1153x1153px]]
+
[[File:LinodeCreate.png|alt=|1153x1153px]]Next, from "'''Choose a distribution field'''" select "'''Debian 11'''" as the desired image.  
Next, from "'''Choose a distribution field'''" select "'''Debian 11'''" as the desired image.  
+
 
 
[[File:LinodeSelectDebian.png|alt=|448x448px]]
 
[[File:LinodeSelectDebian.png|alt=|448x448px]]
Alongside that, make sure to select the preferred region from a given list. In this example "'''Frankfurt, DE'''" is selected as the preferred region.
+
 
[[File:LinodeSelectRegion.png|alt=|756x756px]]
+
Alongside that, make sure to select the preferred region from a given list. In this example "'''Frankfurt, DE'''" is selected as the preferred region.[[File:LinodeSelectRegion.png|alt=|756x756px]]
 +
 
 
For the "'''Linode plan'''" section it is enough to select a "'''Shared CPU'''" with "'''Nanode 1 GB'''" plan for this specific use-case. It may be necessary to adapt and select a different plan, depending on the usage of VM resources.
 
For the "'''Linode plan'''" section it is enough to select a "'''Shared CPU'''" with "'''Nanode 1 GB'''" plan for this specific use-case. It may be necessary to adapt and select a different plan, depending on the usage of VM resources.
 
[[File:LinodeSelectPlan.png|alt=|880x880px]]
 
[[File:LinodeSelectPlan.png|alt=|880x880px]]
 +
 
It is also highly recommended to use a secure root password as well as deny incoming traffic to VM via a public IP address in order to protect VM from being accessed by unknown actors. To configure a root password for Linode VM, set it up before creating the VM:
 
It is also highly recommended to use a secure root password as well as deny incoming traffic to VM via a public IP address in order to protect VM from being accessed by unknown actors. To configure a root password for Linode VM, set it up before creating the VM:
 +
 
[[File:LinodeConfigRootPsw.png|alt=|446x446px]]
 
[[File:LinodeConfigRootPsw.png|alt=|446x446px]]
 +
 
To finish with this section, select "'''Create Linode'''" field on the right-hand side of the website. It is always possible to adjust certain settings but the basic configuration is now complete.
 
To finish with this section, select "'''Create Linode'''" field on the right-hand side of the website. It is always possible to adjust certain settings but the basic configuration is now complete.
   Line 269: Line 280:  
If the keys have been generated successfully, these commands will show the following output (the keys will differ, this is just an example, '''do not use these!'''):
 
If the keys have been generated successfully, these commands will show the following output (the keys will differ, this is just an example, '''do not use these!'''):
   −
[[File:WGprivatekeyVPS.png|alt=|366x366px]][[File:WGpublickeyVPS.png|alt=|364x364px]]
+
[[File:WGprivatekeyVPS.png|alt=|366x366px]]
 +
 
 +
[[File:WGpublickeyVPS.png|alt=|364x364px]]
    
===Installing the WireGuard package on the router===
 
===Installing the WireGuard package on the router===
Line 351: Line 364:     
While not mandatory, it is highly recommended to add a LAN IP reservation for the Helium miner to make sure port forward rule, which will be defined later, always points to the correct device. In order to do this, refer to this section: [[#Configuring static LAN IP lease for the Helium miner]]
 
While not mandatory, it is highly recommended to add a LAN IP reservation for the Helium miner to make sure port forward rule, which will be defined later, always points to the correct device. In order to do this, refer to this section: [[#Configuring static LAN IP lease for the Helium miner]]
      
===Adding a port forward rule to the router===
 
===Adding a port forward rule to the router===
Line 390: Line 402:     
'''cat privatekey'''
 
'''cat privatekey'''
  −
      
Additionally, make sure to edit '''PublicKey''' field. Enter the '''public''' key generated by your router in the field. Leave everything else as-is.
 
Additionally, make sure to edit '''PublicKey''' field. Enter the '''public''' key generated by your router in the field. Leave everything else as-is.
Line 438: Line 448:     
<span style="color:red">'''Warning!'''</span> Remember to edit the private and public key values if you haven't, otherwise the VPN tunnel will not work at all!
 
<span style="color:red">'''Warning!'''</span> Remember to edit the private and public key values if you haven't, otherwise the VPN tunnel will not work at all!
  −
      
After all necessary values for keys have been edited, we can create a new configuration file and copy provided commands, then save the configuration file. In this example, “nano” text editor is used. Enter the following command in CLI and copy paste the configuration above:
 
After all necessary values for keys have been edited, we can create a new configuration file and copy provided commands, then save the configuration file. In this example, “nano” text editor is used. Enter the following command in CLI and copy paste the configuration above:
Line 446: Line 454:     
''Note: to paste a command using PuTTY, simply copy this code and switch back to PuTTY, then enter the nano command and right click once in the empty space of PuTTY client window.''
 
''Note: to paste a command using PuTTY, simply copy this code and switch back to PuTTY, then enter the nano command and right click once in the empty space of PuTTY client window.''
  −
      
To finish editing and save your file, click '''CTRL+S''' (save) and '''CTRL+X''' (exit).
 
To finish editing and save your file, click '''CTRL+S''' (save) and '''CTRL+X''' (exit).
Line 454: Line 460:     
'''echo net.ipv4.ip_forward=1 >> /etc/sysctl.conf'''
 
'''echo net.ipv4.ip_forward=1 >> /etc/sysctl.conf'''
  −
      
To wrap up this section, enter the following line in CLI:
 
To wrap up this section, enter the following line in CLI:
    
'''sysctl -p'''
 
'''sysctl -p'''
  −
   
===Starting the WireGuard interface ===
 
===Starting the WireGuard interface ===
 
----
 
----
Line 471: Line 473:     
'''systemctl daemon-reload'''
 
'''systemctl daemon-reload'''
  −
      
Next, start VPN service:
 
Next, start VPN service:
    
'''systemctl start wg-quick@wg0'''
 
'''systemctl start wg-quick@wg0'''
  −
      
Once done, enter the following command.  
 
Once done, enter the following command.  

Navigation menu