+Using the WireGuard CLI, create a private and public key for your client.
+
+```bash
+umask 077
+wg genkey > wg-privatekey
+wg pubkey < wg-privatekey > wg-publickey
+```
+
+Using the Axelar CLI, create a transaction with a note that includes a `shasum` hash of your public key.
+
+```bash
+axelard tx bank send broadcaster [any-axelar-address] 1uaxl --note "$( echo axelar-wireguard-[wireguard-pubkey] | shasum -a 256 - )"
+```
+
+Send an email to the [Immutable team](mailto:squad-imx-rollups@immutable.com) including your static IP and
+a link to your transaction in the Axelar explorer. For example:
+
+
+> *Please add my public key to the Immutable WireGuard tunnel: `_WIREGUARD_PUBLIC_KEY_`*
+
+> *See my verfication transaction at: `_LINK_TO_EXPLORER_`*
+
+
+
+The Immutable team will reply with a configuration file for your WireGuard client.
+Once you receive this file, update the `PrivateKey` entry with the contents of your `wg-privatekey` file.
+
+Save the WireGuard configuration file in `/etc/wireguard/wg0.conf` and use `wg-quick` to setup the tunnel.
+
+```bash
+wg-quick up wg0
+```
+
+The output should look something like this:
+```bash
+[#] ip link add wg0 type wireguard
+[#] wg setconf wg0 /dev/fd/63
+[#] ip -4 address add dev wg0
+[#] ip link set mtu 8921 up dev wg0
+[#] ip -4 route add dev wg0
+[#] ip -4 route add dev wg0
+[#] ip -4 route add dev wg0
+```
+
+