/ quickstart

Get your first machine online in 2 minutes.

Three steps to create the mesh, plus vendor-specific paste instructions for whatever hardware you have.

  1. 01

    Sign up

    Create your account with Google or email. No credit card. You land in the dashboard in under a minute.

    Sign up free
  2. 02

    Add a machine

    Click Add machine, give it a name (e.g. "branch-mumbai" or "office-router"), and we generate a WireGuard config tied to that machine. The config is shown once — download it or copy it now.

  3. 03

    Paste the config into your device

    Open the WireGuard section of your router or the official WireGuard app on your laptop / phone. Paste the config. The tunnel comes up within seconds.

    Vendor-specific instructions below. Pick yours.

TP

TP-Link

Archer · Deco · ER series with WireGuard support.

  1. Open the router's admin UI (typically http://192.168.0.1)
  2. Go to Advanced → VPN Server → WireGuard
  3. Click Add, paste the [Interface] + [Peer] config from your MeshWG dashboard
  4. Save & Enable
Vendor docs ↗
MI

MikroTik

RouterOS 7+. WireGuard is a first-class interface type.

  1. Open WinBox or the WebFig admin
  2. Go to WireGuard → + (Add) and create the interface
  3. Add a Peer with the public key, endpoint, and allowed-IPs from MeshWG
  4. Add an IP address on the WireGuard interface (your machine's overlay IP)
Vendor docs ↗
OP

OpenWrt

19.07+ via LuCI or /etc/config/network. Wraps wg-quick.

  1. Install: opkg update && opkg install wireguard-tools luci-app-wireguard luci-proto-wireguard
  2. LuCI → Network → Interfaces → Add new interface (Protocol: WireGuard VPN)
  3. Paste the keys, endpoint, and allowed-IPs from MeshWG
  4. Save & Apply
Vendor docs ↗
UB

Ubiquiti

UDM (firmware 3.x+) and EdgeRouter with the wireguard package.

  1. UDM: Settings → Teleport & VPN → VPN Client → WireGuard, import the config
  2. EdgeRouter: install the wireguard .deb, configure via `configure` mode
  3. Reference the public key, endpoint, and allowed-IPs from MeshWG
  4. Commit; save
Vendor docs ↗
OP

OPNsense / pfSense

OPNsense 22.1+ has WireGuard in core. pfSense 2.7+ as a package.

  1. VPN → WireGuard → Instances → Add
  2. Paste keys + tunnel address from MeshWG
  3. Add a Peer with public key, endpoint, allowed-IPs
  4. Enable; assign the interface; firewall rule to allow
Vendor docs ↗
LI

Linux / Mac / Windows / mobile

Use the official WireGuard app — it imports the .conf as-is.

  1. Install the official WireGuard client from wireguard.com/install/
  2. Click Import tunnel(s) from file
  3. Pick the .conf file MeshWG generated for this machine
  4. Activate the tunnel
Vendor docs ↗
/ self-host

Or run MeshWG on your own VM.

Full source under MIT. A single Go binary plus PostgreSQL. deploy/README.md has the 5-step install.