Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add documentation for using the Wireguard iOS client #1264

Closed
dguido opened this issue Dec 20, 2018 · 7 comments · Fixed by #1266
Closed

Add documentation for using the Wireguard iOS client #1264

dguido opened this issue Dec 20, 2018 · 7 comments · Fixed by #1266

Comments

@dguido
Copy link
Member

dguido commented Dec 20, 2018

@jackivanov
Copy link
Collaborator

jackivanov commented Dec 20, 2018

OnDemand is available, but I didn't find a way to configure it through the config files

@davidemyers
Copy link
Contributor

I've already started on updating the README.

@zx2c4
Copy link

zx2c4 commented Dec 21, 2018

OnDemand is available, but I didn't find a way to configure it through the config files

You should be generating the same .conf files as on Android, anyway, and then the instructions for everything can be unified and simple, since the flows and screens are all exactly the same.

@TC1977
Copy link
Contributor

TC1977 commented Dec 21, 2018

Is there a way to carry over the "excluded networks" from the Algo setup? AWS has a pretty low transfer limit on the free tier (30GB), so I'd like to exclude traffic from my home and work Wi-Fi. Otherwise, the on-demand settings, including Wi-Fi vs cellular vs both, are set in the WireGuard app.

@zx2c4
Copy link

zx2c4 commented Dec 21, 2018

Sounds like you want the on-demand settings to filter by SSID? Perhaps we'll add that feature to the app settings at some point down the line.

@TC1977
Copy link
Contributor

TC1977 commented Dec 21, 2018

Sounds like you want the on-demand settings to filter by SSID? Perhaps we'll add that feature to the app settings at some point down the line.

Correct. Algo asks for the excluded networks at the time of deployment and inserts them into the mobileconfig. It'd be nice (at least while we're using both IPsec and Wireguard) if it could also feed those excluded networks to the Wireguard app. In the meantime, being able to at least exclude IP address ranges would work.

@TC1977
Copy link
Contributor

TC1977 commented Mar 20, 2019

The ability to exclude specific SSIDs is now in the Wireguard iOS app as of two days ago. Existing connection settings can be easily updated using the iOS app, but perhaps it’s time to get that into the deploy process. See (#1328 specifically.) Thanks @zx2c4!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants