• pfsense denying wireguard client

    2
    0 Votes
    2 Posts
    411 Views
    T

    Sorry, this is a duplicate, please ignore.

  • WG monitoring ?

    4
    0 Votes
    4 Posts
    739 Views
    cmcdonaldC

    Remember unless you define the remote peer address, Gateway monitoring actually is monitoring the local wire guard address not remote address which from a monitoring perspective is pretty useless

  • Android client

    1
    0 Votes
    1 Posts
    408 Views
    No one has replied
  • Policy Route Phone Through 2nd Wiregurd

    6
    0 Votes
    6 Posts
    731 Views
    D

    @slugger I owe you a debt of gratitude for your last post. You have tremendously clarified my thoughts and helped me resolve some long standing questions/misunderstandings/uncertainties that I've had with regard how VPN's work. I'm sure that the knowledge you passed on to me in your post will benefit me for years to come. Thank you, very, very much!

  • Testing WG correctness

    7
    0 Votes
    7 Posts
    935 Views
    chudakC

    @slugger

    So I know exactly whats going on.
    As I said this laptop connects to two VPNs and creates two tunnels: tun0 and tun1

    When it connects to tun1 it starts having issues letting WG access it.

    I guess it's interesting why it's going on and how to control it, but I am happy it's clear what's going on.

    I thought that by using on ubuntu option "Use this connection only for resources on its network" takes care of this issue, but maybe not (maybe a bug in WG or Ubuntu VPN :) ).

    3ae154f3-3220-41e4-b664-7f7c660d37b0-image.png

    Definitely some difference between OpenVPN and WG

    Thanks for your help !

  • Site to Site Wireguard not routing over tunnel

    3
    0 Votes
    3 Posts
    581 Views
    B

    @jimp Hello Sir.
    I have sort out all issues and now i have more specific questions.(Working now).

    I have added a rule on Wan interface, destination wan address for the port used on both sites. Is this necessary to both ? (1 site has static public ip, the peer is dynamic)

    I have a rule on both sites Lan's: source * (any) instead of Lan net. Does this needed ?

    I have allow all rule on WireGuard auto created tab and also on the Wireguard virtual interface i have made the assignment. Does those rules both needed ?

    Thank you , your comments are much appreciated.

  • Wireguard watchdog

    2
    0 Votes
    2 Posts
    804 Views
    jimpJ

    There is no service or daemon to restart, it's an interface configuration. It can't just "stop working" in that way.

  • Very Slow Wireguard Connection

    2
    1 Votes
    2 Posts
    4k Views
    D

    I'm posting a follow up to my original post with a description of what resolved my issue in case someone comes across this post with a similar problem. The fix I implemented was to change the MSS value for the interface I created for the Wireguard VPN. The following picture shows the MSS setting I changed from a default of "Blank" to 1380. I came to this solution by reading this Netgate blog posting https://www.netgate.com/blog/wireguard-in-pfsense-2-5-performance.html

    2ac9afb9-30d8-4137-b455-32e92bc8bf23-image.png
    Note: The value in the Description field above does not match the value for the Description field in the tunnel setting in my earlier posting. This is just because I was playing around with the settings when trying to resolve the issue and the value was changed. The discrepancy has no relevance to the solution which was entering 1380 in the MSS field.

  • WireGuard HA Sync

    3
    0 Votes
    3 Posts
    2k Views
  • Peer for each mobile client?(SOLVED)

    5
    0 Votes
    5 Posts
    1k Views
    JeGrJ

    @periko said in Peer for each mobile client?(SOLVED):

    @virgiliomi thanks, question answer.

    Maybe that feature will for pf+, I had seen that feature on Linux groups.

    That has nothing to do with plus or not, the QR code logic is already there. Just read the posts from jimp:

    https://forum.netgate.com/post/960960

    Long story short, they are working on it, but it's not that "simple" as just create a QR code as WG treats every peer the same so it's not just a "client export" thingy but the exporter has to be flexible as to the settings the user wants the device to have.

  • Wireguard Remote Access configuration. No access to Internet

    6
    0 Votes
    6 Posts
    4k Views
    UniverseXU

    Thanks @virgiliomi, setting DNS to 10.6.210.1 has resolved the issue. Though I'm still seeing CLOSED:SYN_SENT against Transmission, but this I guess something else.

  • [UnSolved] Possible BUG : Wireguard routing weirdly

    30
    0 Votes
    30 Posts
    4k Views
    arrmoA

    @ab5g Sounds good, thanks!

  • Keep Alive

    15
    0 Votes
    15 Posts
    4k Views
    J

    I copied this from the WireGuard documentation:

    This is called persistent keepalives. When this option is enabled, a keepalive packet is sent to the server endpoint once every interval seconds. A sensible interval that works with a wide variety of firewalls is 25 seconds. Setting it to 0 turns the feature off, which is the default, since most users will not need this, and it makes WireGuard slightly more chatty. This feature may be specified by adding the PersistentKeepalive = field to a peer in the configuration file, or setting persistent-keepalive at the command line. If you don't need this feature, don't enable it. But if you're behind NAT or a firewall and you want to receive incoming connections long after network traffic has gone silent, this option will keep the "connection" open in the eyes of NAT.

    I think by saying “a keepalive packet is sent to the server endpoint” they must mean the public IP address because on the pfSense GUI the Endpoint address is the public one and the Peer WireGuard Address is used to describe the peers tunnel address.

  • Netflix Issues over WireGuard

    50
    0 Votes
    50 Posts
    15k Views
    arrmoA

    @dhiru Yes, agreed - and similar to the link above from @AB5G. There is a way to do this in the webConfigurator as well (you can set MSS inside the interface). I tried it, and it works ... and also fixes my issue, thanks!

    What's very odd, I can see the MSS webConfigurator setting works (based on tcpdump captures). But when I upgraded from 2.5-RC to 2.5 => it no longer seems to be needed. Huh?

    Thanks!

  • services that support pfsense/wireguard?

    2
    0 Votes
    2 Posts
    369 Views
    B

    @beachbum2021 disregard, apparently there's already a thread on this subject.

  • Sending WireGuard traffic over an openVPN tunnel gateway interface

    3
    0 Votes
    3 Posts
    566 Views
    J

    @p1erre That's pretty cool. I don't have a WireGuard endpoint to play with so thanks for testing it. It kind of negates the point of using WireGuard for slight it's speed benefit over openVPN, but still that's pretty cool.

  • mDNS repeater (Avahi) over WireGuard

    2
    1 Votes
    2 Posts
    2k Views
  • Feature request: FQDN for wireguard local and remote endpoint IP

    2
    1 Votes
    2 Posts
    546 Views
    G

    Well I'm an idiot. You CAN use a FQDN in the peer configuration. Way to go Netgate!

  • WireGuard Documentation

    2
    9 Votes
    2 Posts
    2k Views
    RicoR

    https://docs.netgate.com/pfsense/en/latest/recipes/wireguard-s2s.html
    In General Values Tunnel Subnet should be 10.15.210.0/24 not 10.6.210.0/24 ?

    -Rico

  • Basic Remote LAN Access Setup

    6
    0 Votes
    6 Posts
    1k Views
    S

    @ab5g I went through all the rules again and found an incorrect interface specified. All is working now, thanks a lot for the help.

    Now that it's working, I played around a bit an noticed I don't actually need the NAT rule to talk to my LAN (just the WireGuard firewall rule seems to be enough). Is there some additional reason for me to add the NAT as well?

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.