VPN
The Collectu Hub provides a secure WireGuard VPN server, allowing you to safely connect to your devices from anywhere.
Concept
Every user and every organization has its own interface on the Collectu VPN server.
The Collectu VPN server does not forward traffic to other IPs then the one in the interface (e.g. 10.11.12.0/24
).
Installation
- Install the WireGuard client on your device: https://www.wireguard.com/install/
- Log in to your Collectu Hub profile and navigate to
VPN
. - Set a name and click
Create Peer
. - Download the generated configuration file (.conf) or scan the QR code (for mobile devices).
- Import the configuration into your WireGuard client and activate the VPN connection.
- Keep your WireGuard client up to date to receive security patches.
- Never share your VPN configuration file or private keys with anyone.
- Disconnect from the VPN when not in use to reduce your attack surface.
- Use unique peer configurations for each device - do not reuse keys.
- Regularly audit active peers and remove unused configurations from the Collectu Hub.
Windows Configuration Guide
10.11.12.0/24
with your actual VPN interface subnet when configuring firewall and connection settings.
You can find your subnet in the Collectu Hub under VPN settings.
Enable ICMP (Ping) for VPN Subnet
Allowing ICMP traffic enables ping requests for network troubleshooting and connectivity verification within the VPN subnet.
The following commands enable inbound ICMPv4 echo requests (ping) specifically for your VPN subnet. Run these commands in PowerShell as Administrator:
English:
Set-NetFirewallRule -DisplayName "File and Printer Sharing (Echo Request - ICMPv4-In)" -Profile Any -Enabled True -RemoteAddress 10.11.12.0/24
German:
Set-NetFirewallRule -DisplayName "Datei- und Druckerfreigabe (Echoanforderung - ICMPv4 eingehend)" -Profile Any -Enabled True -RemoteAddress 10.11.12.0/24
Windows Remote Desktop Connection
These commands restrict Remote Desktop Protocol (RDP) access exclusively to devices connected through the VPN, significantly enhancing security by preventing unauthorized access from the public internet.
Enable all firewall rules in the "Remote Desktop" group for the VPN subnet 10.11.12.0/24
.
Only devices within this IP range will be able to establish RDP connections:
English:
Set-NetFirewallRule -DisplayGroup "Remote Desktop" -Enabled True -Profile Any -RemoteAddress 10.11.12.0/24
German:
Set-NetFirewallRule -DisplayGroup "Remotedesktop" -Enabled True -Profile Any -RemoteAddress 10.11.12.0/24
Set Network Profile and Start Remote Desktop Service
The following commands configure the network profile as Private (required for local network firewall rules) and ensure that the Remote Desktop service is running.
Step 1: List all network interfaces to identify your VPN interface name:
Get-NetConnectionProfile
Step 2: Set the VPN interface to Private network profile (replace peer-1
with your actual VPN interface name from Step 1):
Set-NetConnectionProfile -InterfaceAlias "peer-1" -NetworkCategory Private
Enable Remote Desktop via Registry
These registry modifications ensure that Remote Desktop is enabled at the system level, which is necessary even if it was previously disabled through Windows Settings.
Check the current Remote Desktop status (1 = disabled, 0 = enabled):
Get-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name fDenyTSConnections
Enable Remote Desktop by setting the registry value to 0:
Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name fDenyTSConnections -Value 0
Restart the Remote Desktop service to apply all changes:
Start-Service -Name TermService
Verify the Remote Desktop service is running:
Get-Service -Name TermService
After applying these settings, your Windows device will accept Remote Desktop connections only from devices connected via the VPN subnet, while all other connection attempts will be blocked by the firewall.
Testing VPN Connection
You can test your VPN connection using ping and traceroute commands from your client device:
-
Test connectivity to the VPN gateway (replace
10.11.12.1
with your actual gateway IP) or any other connected device:ping 10.11.12.1
-
Verify the routing path through the VPN.
Windows:
tracert 10.11.12.1
Linux/macOS:
traceroute 10.11.12.1
Expected result: The trace should show a direct path through your WireGuard interface.
-
Shows active WireGuard interfaces and peer handshake status.
wg show
Templating
Introduction