Living in a semi-rural/exurban area, I have few choices for internet (save me Starlink!), and currently use a small semi-local WISP (wireless ISP); as is becoming more common to save IPv4 addresses they have us behind Carrier-grade NAT (CGN, CG-NAT) (and don’t support IPv6), so there’s no way to expose a service to the internet. I recently became interested in Chia, and started plotting and farming using the spare disk space on my home Plex media server (an older server-class Xeon with a bunch of hard drives). However, I was having trouble finding and keeping peers, and kept losing sync, since my node could only connect out. This motivated me to finally look into setting up a VPN tunnel out through a small cloud VPS, which turned out to be really easy with wireguard.

Note: while this is focused on Chia, these instructions work equally well for any other service you may want to host at home - HTTP, Plex, etc. The only difference is the port(s) forwarded from the cloud server with iptables.

Warning: these instructions can be a bit technical, and assume some knowledge of UNIX/Linux command line 1. For an easier (and maybe even cheaper!) option, some dedicated VPN services, such as PureVPN, can provide port forwarding and I’ve been told work well with Chia.

What you’ll need

Set up the server

Check your cloud provider’s documentation for how to set up your server. At minimum there’s a couple things you will want to do to protect the security of your VPN:

  1. Set up a sudo user
  2. Disable root login (set PermitRootLogin no in /etc/ssh/sshd_config)
  3. Update the OS

Also recommended:

  1. Set up key-based authentication and disable password authentication
  2. Install fail2ban, to block IP addresses that fail login attempts: sudo apt install fail2ban

Finally, to allow the server to route traffic through the VPN you’ll need to enable IP forwarding:

$ sudo sysctl -w net.ipv4.ip_forward=1

And set the following in /etc/sysctl.conf to persist the setting after reboot:


Install Wireguard

See the wireguard instructions for your OS. For Ubuntu:

$ sudo apt install wireguard

Generate Keys

On each server run the following to generate the server’s private and public keys:

$ sudo -i
# cd /etc/wireguard
# umask 077
# wg genkey | tee privatekey | wg pubkey > publickey

Now the private and public keys will be in /etc/wireguard/privatekey and /etc/wireguard/publickey, respectively.

Home server configuration

We’re going to configure the home server to connect to wireguard on the cloud server and route all traffic to the internet through it as well as accept traffic routed from the internet through it (local traffic won’t be affected).

As root, create and edit the file /etc/wireguard/wg0.conf:

$ sudo vi /etc/wireguard/wg0.conf

Here’s the full contents, with angle brackets indicating placeholders:

PrivateKey = <contents of /etc/wireguard/privatekey>
Address =

PublicKey = <contents of /etc/wireguard/publickey on the cloud server>
Endpoint = <cloud server public IP address>:51822
AllowedIPs =
PersistentKeepAlive = 25

Cloud server configuration

We’ll configure the cloud server to listen on the port we configured the home server to connect to (51822), and establish iptables firewall rules to direct traffic received on the Chia port 8444 through the VPN to the home server, as well as to make any traffic from the home server look like it’s actually coming from the cloud server.

As root, create and edit the file /etc/wireguard/wg0.conf:

$ sudo vi /etc/wireguard/wg0.conf

Here’s the full contents, with angle brackets indicating placeholders:

PrivateKey = <contents of /etc/wireguard/privatekey>
Address =
ListenPort = 51822

PreUp = iptables -t nat -A PREROUTING -d <cloud public IP> -p tcp --dport 8444 -j DNAT --to-destination
PreUp = iptables -t nat -A POSTROUTING -s -j SNAT --to-source <cloud public IP>
PostDown = iptables -t nat -D PREROUTING -d <cloud public IP> -p tcp --dport 8444 -j DNAT --to-destination
PostDown = iptables -t nat -D POSTROUTING -s -j SNAT --to-source <cloud public IP>

PublicKey = <contents of /etc/wireguard/publickey on the home server>
AllowedIPs =

Starting Wireguard

Start wireguard on each server with the /etc/wireguard/wg0.conf config. On Ubuntu:

$ sudo systemctl start [email protected]

You can check that it started successfully with:

$ sudo systemctl status [email protected]

And check that traffic is moving with:

$ sudo wg show

It should show a “latest handshake” and “transfer” amount on both servers.

Verifying it worked

To test that traffic is being routed correctly from the cloud server to your home server, you can use telnet on some other machine (even on your home network - remember, as far as everyone else is concerned, your home server is now indistinguishable from your cloud server):

$ telnet <cloud public IP> 8444
Trying <cloud public IP>...
Connected to <cloud public IP>.
Escape character is '^]'.

On your home server, you can make sure outbound traffic is going through wireguard with traceroute, e.g.:

$ traceroute
traceroute to (, 30 hops max, 60 byte packets
 1 (  45.708 ms  45.689 ms  45.669 ms
 2  * * *
 3 (  75.545 ms  75.507 ms  75.508 ms

We see the first hop is to, which is the internal wireguard IP address for the cloud server, which shows it’s working!

You could also fire up a Chia client on some other machine, and manually connect to your server. If it connects and shows ports 8444/8444 then it’s working.

Happy farming! You can reach me on Keybase with questions. If you happen to strike it rich on Chia, and feel this helped, you can send me a tip: xch1ahlrrfs7034afqs72gplrzj3uu4gpyhvsxmzz4u59r544u53rqmqjlyplx.

  1. If you don’t have experience with the Linux command line and tools, but are willing to learn, the “Missing Semester” Course from MIT is a wonderful, quick (free!) introduction, that even experienced Linux users can learn something from. ↩︎