Create Whonix-Gateway ™ ProxyVMs
From Whonix
< Qubes
Introduction[edit]
This procedure is for advanced users who want the security benefit of separate Whonix-Gateway ™ instances in Qubes-Whonix ™. While it affords some protection in the event other Whonix-Gateway ™ instances are compromised, it will result in a different set of Tor entry guards unless precautions are taken.
Ensure the newly created sys-whonix is based on the whonix-gw-16 Template and has a distinctive VM name, so it is not confused with other VMs. It is also recommended to not run multiple Whonix-Gateway ™ in parallel, see Multiple Whonix-Gateway ™.
Procedure[edit]
To create a Whonix-Gateway ™ ProxyVM in Qubes R4:
Qubes VM Manager→Qube→Create new qube- Name and label: Name the ProxyVM. Do not include any personal information; if the ProxyVM is compromised, the attacker could run
qubesdb-read /nameto reveal its name. Use a generic naming convention, for example:sys-whonix. - Color: Choose a color label for the Whonix-Gateway ™ ProxyVM.
- Type: Choose the type
AppVM. - Template: Choose Whonix-Gateway ™ Template. For example:
whonix-gw-16. - Networking: Choose the desired clearnet Service Qube from the list. For example:
sys-firewall. - Advanced: Place a check mark in the "provides network" box. This will allow the Whonix-Gateway ™ ProxyVM to provide networking for other App Qubes.
- Press:
OK.
Figure: Qubes Manager: Create New Qube
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
| 100px | |
| Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Check out the Whonix ™ News Blog.
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP |
Freedom Software /
Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.
