defguard
  • Introduction
  • User documentation (help)
    • Configuring VPN
      • Defguard Desktop Client
        • Update instance
      • Other WireGuard® Clients
        • Configuring a device for new VPN Location manually
    • Password change / Reset
    • Enrollment & Onboarding
      • With internal Defguard SSO
      • With external SSO (Google/Microsoft/Custom)
    • Setting up 2FA/MFA
    • Desktop Client
    • CLI Client
  • Admin & features
    • Deploying your instance
      • One-line install script
      • Standalone package based installation
      • Docker images and tags
      • Docker Compose
      • Kubernetes
      • Upgrading
      • Gateway
        • Running gateway on MikroTik routers
      • Securing gRPC communication
      • OpenID RSA key
      • Configuration
      • Pre-production and development releases
      • High Availability and Failover
      • Health check
    • Features & configuration
      • Zero-Trust VPN with 2FA/MFA
        • Create/manage VPN Location
        • Network overview
        • Executing custom gateway commands
        • Multi-Factor Authentication (MFA/2FA)
          • MFA Architecture
        • Remote desktop client configuration
        • DNS and domains
      • Remote user enrollment
        • User onboarding after enrollment
      • SSO (OpenID Connect)
        • Portainer
        • Grafana setup
        • Proxmox
        • Matrix / Synapse
        • Django
        • MinIO
        • Vault
      • SMTP for email notifications
      • YubiKey Provisioning
      • Webhooks
      • Forward auth
      • SSH Authentication
      • Network devices
      • Gateway notifications
      • New version notifications
  • Troubleshooting Guide
    • Sending support information
    • Client Windows installer exit codes
    • Client "All traffic" connection issues
    • WebAuthn security keys
  • Enterprise Features
    • License
    • Enteprise features
      • Automatic (real time) desktop client configuration & sync
      • External OpenID providers
        • Google
        • Microsoft
        • Zitadel
        • Keycloak
        • JumpCloud
        • Okta
        • Custom
      • External OIDC secure enrollment
      • VPN & Client behavior customization
      • REST API
      • Access Control List
        • ACL Aliases
      • LDAP and Active Directory integration
        • Configuration
        • Settings table
        • Two-way LDAP and Active Directory synchronization
  • Tutorials
    • Step by step setting up a VPN server
      • Adding additional VPN locations
  • In depth
    • Roadmap
    • Architecture
      • How do VPN statistics work
      • Security concepts
  • For Developers
    • Contributing
    • Environment setup
    • Translations (core/web)
      • Switching language
      • Adding translations
  • Translations (client)
    • Adding translations
  • Contact us
    • Community & Support
Powered by GitBook
On this page
  • Installing Wireguard/VPN client
  • Adding a device to connect to VPN

Was this helpful?

Edit on GitHub
  1. User documentation (help)
  2. Configuring VPN

Other WireGuard® Clients

PreviousUpdate instanceNextConfiguring a device for new VPN Location manually

Last updated 29 days ago

Was this helpful?

Installing Wireguard/VPN client

First, you have to install Wireguard application. On this you can find information on how to download Wireguard for any operating system.

Please note that WireGuard clients other than do not work with Multi-Factor Authentication and they can only be used for Locations without MFA - as the only client supporting this feature is our desktop client.

Adding a device to connect to VPN

  1. Go to your profile (My Profile - which you'll find on the navigation on the left side of the screen)

  2. Click on Add new device

  1. Now you can name your device (like Laptop, Phone, whatever you like) and then you have two options:

a. Generate key pair - if you are a new user, just select this option - it will generate a secure key pair (private and public key) - securly in you browser (defguard doesn't store user private keys)

Choosing this option - when you download your configuration (or use QR Code to configure Wireguard on your mobile device) - the private key will be included in your configuration and there will be noting else you need to do

b. Use my own public key - if you are an advanced user and know how to generate a key pair yourself - you can choose this option and enter your own public key (keeping your private key to yourself)

Choosing this option - you will need to change PrivateKey (insert the private key you hold) in the configuration file you download

  1. Now you can download/configure your Wireguard/VPN client by:

    1. downloading the configuration

    2. Copy configuration to Clipboard

    3. Use Wireguard feature to configure by scanning the QR Code

If you have multiple VPN locations - you can choose to download configuration for each of the location - by selecting the location as shown

site
Defguard Desktop Client