wireguard.conf (builder)
Offline editor. Explanations are comment lines.
Treat keys as secrets. This page doesn’t send anything, but your screen might.
[Interface]
Private key for this device. Generate with: wg genkey
PrivateKey
=
Public key for this device (paste from: wg pubkey < privatekey). Optional but helps peer-side snippets.
PublicKey
=
Tunnel IP(s) on this interface. Comma-separated. Use /32 for IPv4 host, /128 for IPv6 host.
Address
=
UDP listen port (common default: 51820). Often only needed on the side that receives inbound.
ListenPort
=
Client DNS hint. Common on phones/laptops. Optional.
DNS
=
MTU. Leave blank unless you have a reason (PMTU/fragmentation issues).
MTU
=
Linux-only: routing table control. Leave blank unless you know why (auto/off/number).
Table
=
Linux server trick: firewall/NAT commands when the interface comes up.
PostUp
=
Undo PostUp commands when the interface goes down.
PostDown
=
Quick templates (fills non-secret defaults only).
Template
=
Config name (comment only) added at top of output.
Name
=
Export helper: when showing examples, you can export with safe dummy placeholders.
Peers repeat as [Peer] blocks below.
wireguard.conf (output)
(edit fields to generate)
peer_side_snippets (optional)
fill peer privatekey + address
(fill peer private keys to generate)