Esta página se muestra en inglés. Una traducción al español está en curso.
ConfigsMay 17, 2026·3 min de lectura

Innernet — Simplified WireGuard Mesh Networking

Innernet is a tool for managing private WireGuard-based mesh networks with a central coordination server, CIDR-based access control, and automatic peer discovery for teams and infrastructure.

Listo para agents

Este activo puede ser leído e instalado directamente por agents

TokRepo expone un comando CLI universal, contrato de instalación, metadata JSON, plan según adaptador y contenido raw para que los agents evalúen compatibilidad, riesgo y próximos pasos.

Native · 98/100Política: permitir
Superficie agent
Cualquier agent MCP/CLI
Tipo
Skill
Instalación
Single
Confianza
Confianza: Established
Entrada
Innernet Overview
Comando CLI universal
npx tokrepo install 559e88da-5187-11f1-9bc6-00163e2b0d79

Introduction

Innernet simplifies the creation and management of private WireGuard networks for organizations. Instead of manually configuring WireGuard on each node, innernet provides a coordination server that handles peer discovery, key exchange, and CIDR-based access policies — letting you build secure mesh networks across cloud instances, offices, and laptops.

What Innernet Does

  • Manages WireGuard peer configurations centrally with automatic distribution to all nodes
  • Implements CIDR-based access control so different network segments can be isolated
  • Handles peer discovery and NAT traversal for nodes behind firewalls
  • Provides invitation-based onboarding: generate a file, share it, and the peer joins automatically
  • Periodically syncs peer lists so new nodes are reachable by all authorized peers

Architecture Overview

Innernet uses a client-server model where the server maintains the authoritative peer database in SQLite. Each client periodically contacts the server over a WireGuard tunnel to fetch updated peer lists and push its own endpoint information. The actual data traffic flows peer-to-peer through WireGuard — the server only coordinates metadata. CIDRs form a hierarchy that determines which peers can communicate with each other.

Self-Hosting & Configuration

  • Server runs on a single publicly-reachable host with minimal resources (SQLite backend)
  • Network topology defined via CIDR hierarchy — assign subnets to teams, environments, or roles
  • Invitation files contain initial WireGuard keys and server endpoint for one-command onboarding
  • Peer refresh interval configurable to balance freshness against server load
  • Admin peers can manage the network (add/remove peers, modify CIDRs) via the CLI

Key Features

  • Built on WireGuard for proven cryptographic security and high performance
  • CIDR-based access groups provide network segmentation without complex firewall rules
  • Automatic peer discovery eliminates manual key exchange and endpoint configuration
  • Lightweight coordination server with no persistent connections — uses WireGuard for all communication
  • Designed for self-hosting with no external dependencies or cloud services required

Comparison with Similar Tools

  • Tailscale — hosted coordination with broader NAT traversal; innernet is fully self-hosted with CIDR-based access control
  • Headscale — self-hosted Tailscale control server but more complex; innernet is simpler with native CIDR policies
  • Netmaker — full-featured mesh VPN with web UI; innernet is lighter and CLI-focused
  • WireGuard (raw) — requires manual config on every peer; innernet automates peer management and key distribution

FAQ

Q: Does all traffic route through the innernet server? A: No. The server only distributes peer metadata. Actual traffic flows directly between peers via WireGuard tunnels.

Q: Can innernet work with peers behind NAT? A: Yes. Peers report their endpoints to the server, and WireGuard's UDP hole-punching handles most NAT scenarios.

Q: How does access control work? A: CIDRs form a tree. A peer can only communicate with peers in its own CIDR or parent CIDRs, providing natural network segmentation.

Q: What happens if the coordination server goes down? A: Existing connections continue working since they are direct WireGuard tunnels. New peers cannot join and existing peers cannot discover updates until the server returns.

Sources

Discusión

Inicia sesión para unirte a la discusión.
Aún no hay comentarios. Sé el primero en compartir tus ideas.

Activos relacionados