https://www.wirehub.org/ wirehub b Social Networking :) * Login * or * Sign Up The easiest way to create and share WireGuard Networks. 1. Define WireGuard networks, devices, and connections. 2. Invite friends, family and teammates to add their devices. 3. View, Scan or Download WireGuard configuration files. Join the Beta! Free Existing member? Login What is WireHub? WireHub is a WireGuard configuration generator -- it supports multiple networks and devices, label-based access rules, invitations and permissions, and secure storage of WireGuard PrivateKeys. PrivateKeys can be generated in-browser or imported if you already have them. If provided, PrivateKeys are encrypted in-browser using WebCrypto with a password of your choice. WireHub never receives nor stores your password. Peering between network devices is defined with label-based rules. Labels are applied to devices and are then used in connection rules, covering all your Peer, AllowedIPs, and PreSharedKey needs. Network members may be invited as Guests, Members, Managers or Admins -- Guests don't even have to create an account with WireHub. Managers and Admins can generate and manage the keys for any device, while Members and Guests can only manage their assigned devices. Other than the in-browser PrivateKey encryption/decryption mechanism, all functionality of WireHub is accessible without JavaScript. Read on to find out more or Join the Beta! Features 1. Networks [networks2] Connect multiple devices over one or more WireGuard Virtual Private Networks (VPN). For example, a network called Home may be used for all your family's personal devices, and a network called Office may be used for all your work-related devices. A network-level CIDR of your own choosing, like 10.10.0.0/24, is used to automatically assign unique IP addresses to peers added to the network. You can even specify default DNS settings to be applied to all connected devices. 2. Devices [devices] Add your laptops, phones, servers or any other WireGuard-enabled device. Each device automatically gets an IP addresses from the network CIDR, like 10.10.0.5/32, and you may also specify additional addresses, like 192.168.65.5/32. Using custom labels like pihole, media, server:app-1, etc you can easily group and filter your devices. 3. Connections Screenshot of Connections preview interface, showing how labels are used to define peers Label-based Access Controls, using device labels to define network peers. Peering between devices is achieved via uni-directional label-based connection rules -- both devices need to specify the connection using the labels applied to them. You can also specify the AllowedIPs to be used for each connection using keywords such as peers (only the IPs of the two peers), network (the network CIDR), and all (all traffic, 0.0.0.0/24). For direct peer-to-peer connections, PreShared keys are automatically generated and shared between the peers by default. And you can specify pass-through connections to describe Hub/Site topologies, Web Proxies, or VPN exit nodes. 4. Members Screenshot of Members preview UI, showing multiple members with different roles, some of which have joined the network while others are still Pending. Invite friends, teammates and co-workers to claim their devices. Simple Role-Based Access Controls to specify who gets to do what in your network. Guests -- for when you just want to securely share WireGuard Configuration files. Guests can only view devices assigned to them. No WireHub account required. Members -- for when you want people to manage their own devices. Members can add their own devices and view other network devices, but can only modify their own devices or those assigned to them. Managers & Admins -- when you want others to manage the network. Managers and Admins can invite new members, revoke memberships, create or modify connections, and make changes to network configuration. Managers and Admins can also preview their networks from the perspective of other members to make sure everything's all right. 5. Interfaces [wg-keys] Securely store and manage your Private/Public Keys. Interfaces represent the [Interface] section of a WireGuard configuration file -- most importantly the Private/Public Keys. As such, Interfaces are considered private to the user that created them. Once an Interface is assigned to a network Device, either by a network Manager or the device owner, its Public Key and Endpoint (if any) are shared with the Device's peers. Private Keys, if shared with WireHub, are client-side encrypted using WebCrypto and password protected with a password that does not leave your browser -- you really own your private keys. Here's what you get This is an interactive example WireGuard Configuration Preview UI for the Hub device in my Home network where the Hub connects to all available devices. Try it out! WireGuard Configuration Copy Copied Error QR Download 1. Viewing configuration for Home Network. 2. [Interface] # Name = admin/home-hub # PrivateKey = ******** # PublicKey = DHlM/s59bdfP4/sKj6eyPesWKsc2Y5QNd8kMlMzPOSI= 3. # Device = home/hub Address = 10.10.10.1 4. [Peer] # Name = home/iphone PublicKey = GkCpbysgq35AUCDGqJ5O0a086fdTbG85b3Ces2iVFCQ= PresharedKey = PMeoZ/E1/I7lg7xF5zNtJV+3MZnfXoBi4KiGXFzFwgI= AllowedIPs = 10.10.10.4/32 5. [Peer] # Name = home/home-server PublicKey = Y6vLxZNeGC2y9mpo0g9QCm2yuAu7UDTT77pEdgiOASg= PresharedKey = ZfZMWyeEYs6swPfY5gpxL6CRuxeNS73h6LLGHNfZQKQ= AllowedIPs = 10.10.10.2/32 AllowedIPs = 192.168.68.24/32 6. [Peer] # Name = home/ipad PublicKey = ygoa+Y44zbQg9loEqofkMIiKVXYhNbunVbY+KClwkys= PresharedKey = fB689E6GqReGknOEu1RrtXWmjUPA59+IZLoludmYV7k= AllowedIPs = 10.10.10.3/32 7. [Peer] # Name = home/macbook PublicKey = 1TgSkmCdHRyARlZy3DZ8r8/p/LbXHvb/REhiRlGj2yY= PresharedKey = YihQc9YZVvA2LSb0h6uw0FIyseRsZkMuGmZ81P3mCTE= AllowedIPs = 10.10.10.5/32 Join the Beta! Free Existing member? Login Made by Nicolas Rudas. All rights reserved. "WireGuard" and the "WireGuard" logo are registered trademarks of Jason A. Donenfeld. 1. Security 2. Privacy 3. Terms No Yes