{"id":1849,"date":"2025-08-24T22:49:26","date_gmt":"2025-08-24T14:49:26","guid":{"rendered":"https:\/\/1212967.xyz\/blog\/?p=1849"},"modified":"2025-09-17T21:46:39","modified_gmt":"2025-09-17T13:46:39","slug":"%e5%ae%b6%e9%87%8c%e4%ba%91%e8%ae%a1%e5%88%92%ef%bc%9a%e4%bd%bf%e7%94%a8wireguard%e5%92%8cvps%e8%ae%a9%e5%ae%b6%e9%87%8c%e4%ba%91%e6%8b%a5%e6%9c%89%e5%85%ac%e7%bd%91ip","status":"publish","type":"post","link":"https:\/\/1212967.xyz\/blog\/2025\/08\/24\/%e5%ae%b6%e9%87%8c%e4%ba%91%e8%ae%a1%e5%88%92%ef%bc%9a%e4%bd%bf%e7%94%a8wireguard%e5%92%8cvps%e8%ae%a9%e5%ae%b6%e9%87%8c%e4%ba%91%e6%8b%a5%e6%9c%89%e5%85%ac%e7%bd%91ip\/","title":{"rendered":"\u5bb6\u91cc\u4e91\u8ba1\u5212\uff1a\u4f7f\u7528wireguard\u548cvps\u8ba9\u5bb6\u91cc\u4e91\u62e5\u6709\u516c\u7f51IP"},"content":{"rendered":"\n<p>\u2014\u2014\u5e76\u4e14\u53ef\u4ee5\u770b\u89c1\u5ba2\u6237\u7aef\u7684<strong>\u771f\u5b9eIP<\/strong>\uff01<\/p>\n\n\n\n<p><strong>\u5df2\u77e5\u95ee\u9898<\/strong>\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u65e0\u6cd5\u8bbf\u95eedocker\u6620\u5c04\u51fa\u7684\u7aef\u53e3\uff0c\u56e0\u4e3adocker\u4f1a\u518d\u6b21\u8fdb\u884cNAT\u64cd\u4f5c\uff0c\u5bfc\u81f4\u56de\u5305\u6e90IP\u53d8\u4e3adocker\u5bb9\u5668\u5185\u90e8ip\u800c\u975e10.0.0.2\uff0c\u4e0d\u80fd\u88ab\u7b56\u7565\u8def\u7531\u5339\u914d<\/li>\n\n\n\n<li>\u7531\u4e8ewireguard\u63a5\u6536\u7684\u6d41\u91cf\u4f1a\u8fdb\u5165forward\u94fe\u800c\u4e0d\u662finput\u94fe\uff0cufw\/fail2ban\u5728\u9ed8\u8ba4\u60c5\u51b5\u4e0b\u65e0\u6cd5\u5c01\u9501\u6765\u81ea\u67d0ip\u7684\u6d41\u91cf\uff0c\u53ef\u624b\u52a8\u6dfb\u52a0iptables\u89c4\u5219<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">0.\u8981\u6c42<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u4e00\u53f0\u5bb6\u5ead\u670d\u52a1\u5668<\/li>\n\n\n\n<li>\u4e00\u53f0\u62e5\u6709\u516c\u7f51IP\u7684\u4e91\u670d\u52a1\u5668\uff0c\u7528\u4e8e\u6d41\u91cf\u8f6c\u53d1<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">1.\u76f8\u6bd4\u5e38\u89c1\u7684\u5176\u4ed6\u5185\u7f51\u7a7f\u900f\u65b9\u6848\u7684\u4f18\u52bf<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u4f7f\u7528\u5546\u4e1a\u65b9\u6848\uff1a<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u53c8\u8d35\u53c8\u6162\uff0c\u4e0d\u5982\u81ea\u5efa\u4e00\u6839<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u5176\u4ed6\u81ea\u5efa\u65b9\u6848\uff1a<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Wireguard\u6027\u80fd\u660e\u663e\u66f4\u5f3a\uff08\u5305\u62ecfrp\u3001ngrok\u7b49\u7aef\u53e3\u6620\u5c04\u5de5\u5177\uff0copenvpn\u7b49\u5176\u4ed6l2 vpn\u5de5\u5177\uff09<\/li>\n\n\n\n<li>\u652f\u6301\u8303\u56f4\u7aef\u53e3\u8f6c\u53d1\uff0c\u540c\u65f6\u8f6c\u53d1\u4e0a\u4e07\u4e2a\u7aef\u53e3\u6216\u5168\u7aef\u53e3<\/li>\n\n\n\n<li><strong>\u672c\u6587\u4e2d\u5b9e\u73b0\u7684\uff1a\u4e3a\u6240\u6709tcp\/udp\u670d\u52a1\u4f20\u9012\u771f\u5b9eIP\uff0c\u65e0\u9700proxy protocol\uff0c\u51e0\u4e4e\u8fd8\u539f\u516c\u7f51\u4f53\u9a8c<\/strong><\/li>\n\n\n\n<li>\u5b8c\u7f8e\u652f\u6301ipv6\uff08\u672c\u6587\u4e2d\u672a\u5b9e\u73b0\u4f46\u548cipv4\u914d\u7f6e\u65b9\u6cd5\u5b8c\u5168\u4e00\u6837\uff09\uff08\u771f\u7684\u6709\u4eba\u7528ipv6\u5417\uff09<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">2.\u901a\u8fc7wireguard\u5b9e\u73b0\u5185\u7f51\u4e92\u901a\uff1a<\/h2>\n\n\n\n<p>\u6559\u7a0b\u53c2\u8003<a href=\"https:\/\/varkai.com\/posts\/operation\/use-wireguard-networking-to-achieve-intranet-penetration\/\">https:\/\/varkai.com\/posts\/operation\/use-wireguard-networking-to-achieve-intranet-penetration\/<\/a> \u7684\u6559\u7a0b<\/p>\n\n\n\n<p>\u914d\u7f6e\u4e91\u670d\u52a1\u5668\u5185\u7f51ip\u4e3a10.0.0.1\uff0c\u5bb6\u91cc\u4e91ip\u4e3a10.0.0.2\uff0c\u53ef\u4e92\u76f8ping\u901a\u3001\u8bbf\u95ee\u670d\u52a1\u540e\u8fdb\u884c\u4e0b\u4e00\u6b65<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.\u5728\u4e91\u670d\u52a1\u5668\u4e0a\u914d\u7f6eDNAT\/SNAT\u8f6c\u53d1\u89c4\u5219<\/h2>\n\n\n\n<p>\u6559\u7a0b\u53c2\u8003<a href=\"https:\/\/superuser.com\/questions\/1777082\/using-vps-to-give-public-ip-to-on-home-network\/1777106\">https:\/\/superuser.com\/questions\/1777082\/using-vps-to-give-public-ip-to-on-home-network\/1777106<\/a><\/p>\n\n\n\n<p>\u5f88\u591a\u8f6c\u53d1\u6559\u7a0b\u4f1a\u4f7f\u7528masquerade\uff0c\u8fd9\u6837\u5f53\u7136\u975e\u5e38\u7b80\u5355\uff0c\u4f46\u662f\u4f1a\u5bfc\u81f4<strong>\u8fd0\u884c\u5728\u5bb6\u91cc\u4e91\u4e0a\u7684\u670d\u52a1\u65e0\u6cd5\u83b7\u53d6\u8bbf\u95ee\u8005\u7684\u771f\u5b9eip\uff0c\u5168\u90e8\u663e\u793a\u4e3a10.0.0.1<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ssh\/rdp\/web\u65e5\u5fd7\u5168\u90e8\u6765\u81ea10.0.0.1\uff0c\u65e0\u6cd5\u5c01\u7981\u7206\u7834ip<\/li>\n\n\n\n<li>\u6e38\u620f\u670d\u52a1\u5668\u4e2d\u6240\u6709\u73a9\u5bb6\u7684\u6570\u636e\u5305\u90fd\u4f1a\u6765\u81ea10.0.0.1\uff0c\u89e6\u53d1\u901f\u7387\u9650\u5236\u5bfc\u81f4\u73a9\u5bb6\u6389\u7ebf<\/li>\n<\/ul>\n\n\n\n<p>\u4f7f\u7528DNAT\/SNAT\u5373\u53ef\u89e3\u51b3\uff0c\u89c4\u5219\u5982\u4e0b\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>iptables -I FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\niptables -I FORWARD -d 10.0.0.2 -m conntrack --ctstate DNAT -j ACCEPT\n\niptables -t nat -I PREROUTING -p tcp -d &#91;VPS public IP] -i ens192 --dport 80 -j DNAT --to-destination 10.0.0.2:80\niptables -t nat -A POSTROUTING -o ens192 -j SNAT --to-source &#91;VPS public IP]<\/code><\/pre>\n\n\n\n<p>\u5176\u4e2dens192\u6362\u4e3avps\u7684\u7f51\u5361\uff0cVPS public IP\u4e0d\u4e00\u5b9a\u662f\u670d\u52a1\u5668\u7684\u516c\u7f51IP\uff0c\u7528ifconfig\u67e5\u770b\u7f51\u5361IP\uff0c\u6bd4\u5982\u963f\u91cc\u4e91eth0\u7684\u7ed1\u5b9aIP\u5c31\u662f172.\u5f00\u5934\u7684<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4.\u5728\u5bb6\u91cc\u4e91\u4e0a\u914d\u7f6e\u8def\u7531\u89c4\u5219<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>ip -4 route add default dev wg0 table 4242\nip -4 rule add pref 500 from 10.0.0.2 lookup 4242<\/code><\/pre>\n\n\n\n<p>\u8fd9\u53ef\u4ee5\u786e\u4fdd\u6240\u6709\u6765\u81ea\u4e91\u670d\u52a1\u5668\u7684\u6d41\u91cf\uff0c\u90fd\u901a\u8fc7\u4e91\u670d\u52a1\u5668\u7684IP\u6765\u54cd\u5e94\uff1b\u4e0d\u914d\u7f6e\u8be5\u89c4\u5219\u7684\u8bdd\uff0c\u5bb6\u91cc\u4e91\u5c06\u4f1a\u76f4\u63a5\u4f7f\u7528\u5bb6\u5eadIP\u56de\u5305\uff0c\u5bfc\u81f4\u6570\u636e\u5305\u88ab\u5ba2\u6237\u7aef\u7684\u9632\u706b\u5899\u4e22\u5f03<\/p>\n\n\n\n<p><strong>\u5bf9\u4e8e\u4f7f\u7528udp\u7684\u670d\u52a1\uff08\u5e38\u89c1\u4e8e\u5404\u79cd\u6e38\u620f\u670d\u52a1\u7aef\uff0c\u6bd4\u5982Mincraft BE\u3001CS:GO..\uff09\uff0c\u7ed1\u5b9aIP\u5fc5\u987b\u8bbe\u7f6e\u4e3a\u5bb6\u91cc\u4e91\u7684wireguard IP\uff0810.0.0.2\uff09\uff0c\u5426\u5219\u65e0\u6cd5\u6b63\u5e38\u4f7f\u7528\uff01\uff08\u539f\u56e0\u5982\u4e0a\uff09<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5.\u5b8c\u6574Wireguard\u914d\u7f6e\uff0c\u901a\u8fc7PostUp\/PostDown\u5b9e\u73b0\u81ea\u52a8\u5316<\/h2>\n\n\n\n<p>\u6839\u636e\u5b9e\u9645\u60c5\u51b5\u4fee\u6539<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u4e91\u670d\u52a1\u5668\u7aef\uff1a<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">wg0.conf<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Interface]\nAddress = 10.0.0.1\/24\nSaveConfig = true\nPostUp = \/etc\/wireguard\/post-up.sh\nPostDown = \/etc\/wireguard\/post-down.sh\nListenPort = 61820\nPrivateKey = &#91;VPS Wireguard Private Key]\n\n&#91;Peer]\n...<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">post-up.sh<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>#!\/bin\/bash\n# VPS WireGuard PostUp Script - NAT \u7aef\u53e3\u8f6c\u53d1\u914d\u7f6e\n# \u8f6c\u53d1 1000-60000 \u7aef\u53e3\u7684 TCP\/UDP \u6d41\u91cf\u5230 Homelab\n\n# \u914d\u7f6e\u53d8\u91cf\nPUBLIC_IP=\"172.x.x.x\"  # VPS \u516c\u7f51 IP\nPUBLIC_IFACE=\"eth0\"         # VPS \u516c\u7f51\u63a5\u53e3\nHOMELAB_IP=\"10.0.0.2\"       # Homelab \u5185\u7f51 IP\nPORT_RANGE=\"1000:60000\"     # \u8f6c\u53d1\u7aef\u53e3\u8303\u56f4\n\necho \"&#91;$(date)] Starting VPS NAT rules setup...\"\n\n# 1. \u542f\u7528 IP \u8f6c\u53d1\nsysctl -w net.ipv4.ip_forward=1\necho \"net.ipv4.ip_forward=1\" &gt; \/etc\/sysctl.d\/99-wireguard.conf\n\n# 2. FORWARD \u94fe\u89c4\u5219 - \u5141\u8bb8\u8f6c\u53d1\niptables -I FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\niptables -I FORWARD -d ${HOMELAB_IP} -m conntrack --ctstate DNAT -j ACCEPT\n\n# 3. PREROUTING NAT \u89c4\u5219 - DNAT \u7aef\u53e3\u8f6c\u53d1\n# TCP\niptables -t nat -A PREROUTING -p tcp -d ${PUBLIC_IP} \\\n            -i ${PUBLIC_IFACE} --dport 222 \\\n                -j DNAT --to-destination ${HOMELAB_IP}:22\niptables -t nat -A PREROUTING -p tcp -d ${PUBLIC_IP} \\\n    -i ${PUBLIC_IFACE} --dport ${PORT_RANGE} \\\n    -j DNAT --to-destination ${HOMELAB_IP}\n\n# UDP\niptables -t nat -A PREROUTING -p udp -d ${PUBLIC_IP} \\\n    -i ${PUBLIC_IFACE} --dport ${PORT_RANGE} \\\n    -j DNAT --to-destination ${HOMELAB_IP}\n\n# 4. POSTROUTING NAT \u89c4\u5219 - SNAT \u51fa\u7ad9\u6d41\u91cf\niptables -t nat -A POSTROUTING -o ${PUBLIC_IFACE} \\\n    -j SNAT --to-source ${PUBLIC_IP}\n\necho \"&#91;$(date)] VPS NAT rules setup completed!\"<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">postdown.sh<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>#!\/bin\/bash\n# VPS WireGuard PostDown Script - \u6e05\u7406 NAT \u89c4\u5219\n\n# \u914d\u7f6e\u53d8\u91cf\uff08\u4e0e PostUp \u4fdd\u6301\u4e00\u81f4\uff09\nPUBLIC_IP=\"172.x.x.x\"\nPUBLIC_IFACE=\"eth0\"\nHOMELAB_IP=\"10.0.0.2\"\nPORT_RANGE=\"1000:60000\"\n\necho \"&#91;$(date)] Cleaning up VPS NAT rules...\"\n\n# \u6e05\u7406 FORWARD \u89c4\u5219\niptables -D FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 2&gt;\/dev\/null\niptables -D FORWARD -d ${HOMELAB_IP} -m conntrack --ctstate DNAT -j ACCEPT 2&gt;\/dev\/null\n\n# \u6e05\u7406 PREROUTING \u89c4\u5219\niptables -t nat -D PREROUTING -p tcp -d ${PUBLIC_IP} \\\n                    -i ${PUBLIC_IFACE} --dport 222 \\\n                                    -j DNAT --to-destination ${HOMELAB_IP}:22\niptables -t nat -D PREROUTING -p tcp -d ${PUBLIC_IP} \\\n    -i ${PUBLIC_IFACE} --dport ${PORT_RANGE} \\\n    -j DNAT --to-destination ${HOMELAB_IP} 2&gt;\/dev\/null\n\niptables -t nat -D PREROUTING -p udp -d ${PUBLIC_IP} \\\n    -i ${PUBLIC_IFACE} --dport ${PORT_RANGE} \\\n    -j DNAT --to-destination ${HOMELAB_IP} 2&gt;\/dev\/null\n\n# \u6e05\u7406 POSTROUTING \u89c4\u5219\niptables -t nat -D POSTROUTING -o ${PUBLIC_IFACE} \\\n    -j SNAT --to-source ${PUBLIC_IP} 2&gt;\/dev\/null\n\necho \"&#91;$(date)] VPS NAT rules cleaned up!\"<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">\u5bb6\u91cc\u4e91\u7aef<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">wg0.conf<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Interface]\nPrivateKey = &#91; Homelab Wireguard Private Key]\nAddress = 10.0.0.2\/24\nTable = off\nPostUp = \/etc\/wireguard\/post-up.sh\nPostDown = \/etc\/wireguard\/post-down.sh\n&#91;Peer]\nPublicKey = &#91; VPS Wireguard Public Key ]\nEndpoint = &#91; VPS Reachable Public IP ] :61820\nAllowedIPs = 0.0.0.0\/0, ::\/0\nPersistentKeepalive = 25<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">post-up.sh<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>#!\/bin\/bash\n# Homelab WireGuard PostUp Script - \u7b56\u7565\u8def\u7531\u914d\u7f6e\n\n# \u914d\u7f6e\u53d8\u91cf\nHOMELAB_IP=\"10.0.0.2\"\nWG_IFACE=\"wg0\"\nROUTING_TABLE=\"4242\"\n\necho \"&#91;$(date)] Setting up Homelab policy routing...\"\n\n# 1. \u521b\u5efa\u81ea\u5b9a\u4e49\u8def\u7531\u8868\nip route add default dev ${WG_IFACE} table ${ROUTING_TABLE}\n\n# 2. \u6dfb\u52a0\u7b56\u7565\u8def\u7531\u89c4\u5219 - \u4ece HOMELAB_IP \u53d1\u51fa\u7684\u5305\u8d70 WireGuard\nip rule add from ${HOMELAB_IP} lookup ${ROUTING_TABLE} pref 100\n\n# 3. \u5237\u65b0\u8def\u7531\u7f13\u5b58\nip route flush cache\n\n# 4. \u9a8c\u8bc1\u914d\u7f6e\necho \"Policy routing rules:\"\nip rule show | grep ${ROUTING_TABLE}\necho \"Routing table ${ROUTING_TABLE}:\"\nip route show table ${ROUTING_TABLE}\n\necho \"&#91;$(date)] Homelab policy routing setup completed!\"<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">post-down.sh<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>#!\/bin\/bash\n# Homelab WireGuard PostDown Script - \u6e05\u7406\u7b56\u7565\u8def\u7531\n\n# \u914d\u7f6e\u53d8\u91cf\nHOMELAB_IP=\"10.0.0.2\"\nROUTING_TABLE=\"4242\"\n\necho \"&#91;$(date)] Cleaning up Homelab policy routing...\"\n\n# 1. \u5220\u9664\u7b56\u7565\u8def\u7531\u89c4\u5219\nip rule del from ${HOMELAB_IP} lookup ${ROUTING_TABLE} 2&gt;\/dev\/null\n\n# 2. \u6e05\u7a7a\u8def\u7531\u8868\nip route flush table ${ROUTING_TABLE} 2&gt;\/dev\/null\n\n# 3. \u5237\u65b0\u8def\u7531\u7f13\u5b58\nip route flush cache\n\necho \"&#91;$(date)] Homelab policy routing cleaned up!\"<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">\u6700\u540e<\/h3>\n\n\n\n<p>\u914d\u7f6e\u5b8c\u6210\u4e14\u6d4b\u8bd5\u901a\u8fc7\u540e\uff0c\u53ef\u4ee5\u6267\u884csystemctl enable &#8211;now wg-quick@wg0\u6765\u8ba9wireguard\u670d\u52a1\u5f00\u673a\u81ea\u542f\u52a8<\/p>\n\n\n\n<p>wg-quick up\/down wg0\u53ef\u4ee5\u63a7\u5236\u5f00\u5173<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6.\u6545\u969c\u6392\u9664<\/h2>\n\n\n\n<p>\u5728\u6298\u817e\u7684\u65f6\u5019\u7528\u5230\u7684\u4e00\u4e9b\u6545\u969c\u6392\u9664\/\u6d4b\u8bd5\u624b\u6bb5\uff1a<\/p>\n\n\n\n<p>\u8def\u7531\u6d4b\u8bd5\uff1aip route get 8.8.8.8 from 10.0.0.2\uff0c\u53ef\u4ee5\u68c0\u67e5\u5bb6\u91cc\u4e91\u8def\u7531\u662f\u5426\u8d70wireguard<\/p>\n\n\n\n<p>\u68c0\u67e5udp conntrack\u60c5\u51b5\uff1awatch -n 1 &#8216;sudo conntrack -L -p udp | grep 23333&#8217;<\/p>\n\n\n\n<p>\u8c03\u6574conntrack\u8d85\u65f6\u65f6\u95f4\uff1asysctl -w net.netfilter.nf_conntrack_udp_timeout=30 &amp;&amp; sysctl -w net.netfilter.nf_conntrack_udp_timeout_stream=180<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u53e6\u4e00\u4e2a\u65b9\u6848<\/h2>\n\n\n\n<p>\u53c2\u8003<a href=\"https:\/\/blog.feld.me\/posts\/2025\/03\/static-ips-from-the-cloud\/\">https:\/\/blog.feld.me\/posts\/2025\/03\/static-ips-from-the-cloud\/<\/a><\/p>\n\n\n\n<p>\u8fd9\u4e2a\u4e5f\u662f\u5229\u7528wireguard\uff0c\u4f46\u662f\u4f7f\u7528\u4e86\u66f4\u5e95\u5c42\u7684arp proxy\uff0c\u53ef\u4ee5\u5c06\u516c\u7f51ip\u76f4\u63a5\u7ed1\u5b9a\u5230\u5bb6\u91cc\u4e91\u7684\u865a\u62df\u7f51\u5361\u4e0a\uff0c\u5b9e\u9645\u4e0a\u548c\u516c\u7f51\u65e0\u5f02\u4e86<\/p>\n\n\n\n<p>\u8be5\u65b9\u6848\u7684\u7f3a\u70b9\u662f\u8981\u6c42vps\u6709\u4e24\u4e2aIP\uff0c\u5e76\u4e14<strong>\u4e0d\u80fd\u662fVPC\u7f51\u7edc<\/strong><\/p>\n\n\n\n<p>Edit\uff1a\u76ee\u524d\u51e0\u4e4e\u6240\u6709\u4e91\u670d\u52a1\u5546\u7684VPS\u90fd\u5728\u4f7f\u7528VPC\u7f51\u7edc\uff0c\u6b64\u65b9\u6848\u53ef\u884c\u6027\u8f83\u4f4e<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2014\u2014\u5e76\u4e14\u53ef\u4ee5\u770b\u89c1\u5ba2\u6237\u7aef\u7684\u771f\u5b9eIP\uff01 \u5df2\u77e5\u95ee\u9898\uff1a 0.\u8981\u6c42 1.\u76f8\u6bd4\u5e38\u89c1\u7684\u5176\u4ed6\u5185\u7f51\u7a7f\u900f\u65b9\u6848\u7684\u4f18\u52bf \u4f7f\u7528\u5546\u4e1a\u65b9\u6848\uff1a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1849","post","type-post","status-publish","format-standard","hentry","category-1"],"_links":{"self":[{"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/posts\/1849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/comments?post=1849"}],"version-history":[{"count":9,"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/posts\/1849\/revisions"}],"predecessor-version":[{"id":1860,"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/posts\/1849\/revisions\/1860"}],"wp:attachment":[{"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/media?parent=1849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/categories?post=1849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/1212967.xyz\/blog\/wp-json\/wp\/v2\/tags?post=1849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}