Wireguard via Docker Compose & HTTPS
Docker Config:
Initial Parameters in config.json
:
To configure the Docker Composed file:
Make sure that ports
80
,443
,81
are openAdd a static IP that you will use to point
Nginx Proxy Manager
to itself for HTTPSMap persistent file to config.json
Set up Database username and password & Technical username and password
Map Persistent Data Volumes
Nginx Proxy Manager in Docker:
If you are running this in a docker container your will have to point it to the docker IP:
Create a self signed certificate and make sure to add it to Nginx Proxy Manager.
Then point it to the Container:
This will make the Proxy Manager have HTTPS as well.
Note: Make sure this is not accessible from the Internet Usually this can be done by having a .lan address which is not pointing to a DNS entry or a DDNS entry from the Internet
Let's Encrypt:
NOTE:
Since version 2.9.8 NGINX Proxy Manager supports DUCKDNS
DNS Challange, much easier to set up with that. Get the token from logging into Duckdns.org
Port Forwarding Rule is required for the Nginx Proxy Manager to be reachable from the Internet:
Port
80
to redirect to Internal Server IP on Port80
Port
443
to redirect to Internal Server IP on Port443
The Ports required are 80
and 443
. Once this has been set up and the Firewall Rules
on the Server
are set up to ALLOW
traffic Nginx Proxy Manager
is allowed to communicate with the Let's Encrypt
servers and generate auto-renewing certificates
Last updated