• WireGuard setup

    Moved
    5
    0 Votes
    5 Posts
    991 Views
    S

    @stephenw10 Thank you, before I do anything going to run the new 2.5RC build "as is" a few days just to to make sure there is no fall out from the upgrade. Currently up with new build just under 5 hours and not seeing any issues but still would like to give it a day or two before attempting the WG transition. Thank you again for the info

  • A Different WireGuard Problem

    5
    1 Votes
    5 Posts
    2k Views
    A

    @chuckm2000 If the Wireguard tunnel is up then its routing on the pi. What you need to do it to NAT the remote clients on the pi such that for the local LAN it looks like the traffic is coming from the pi. For instance I have the following on my pi .

    cat /etc/wireguard/wg0.conf

    [Interface]
    Address = 10.100.100.50/32
    PrivateKey = xxxxxxxxx=
    PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
    PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE

    [Peer]
    PublicKey = Pxxxxxc=
    AllowedIPs = 10.100.100.0/24,192.168.1.0/24
    Endpoint = 58.182.47.98:51820

    P.S: I am not on QRZ.

  • "Service" Restart Button, Auto Restart (WireGuard)

    8
    0 Votes
    8 Posts
    2k Views
    arrmoA

    @jimp said in "Service" Restart Button, Auto Restart (WireGuard):

    Going to need a lot more information than "it doesn't work".

    Completely understand ... LOL! Just wanted to mention it, to see if you had also observed the same thing. I'll try to check routes, etc. the next time I reboot, get that info to you (unfortunately, can't reboot right now).

    Thanks!

  • 1 Votes
    8 Posts
    1k Views
    W

    @jimp I was in fact talking about having pfsense present a qr code you could scan on your phone.

    But it would be handy to have that same data as something you can cut/paste in a text format for joining two pfsense boxes. I have less of an idea what that would look like.

  • VPN Service

    2
    0 Votes
    2 Posts
    372 Views
    NogBadTheBadN

    Policy based routing, one of the most asked questions on this forum, suggest you do a search.

    https://forum.netgate.com/search?term=policy%20based%20routing&in=posts&matchWords=all&sortBy=relevance&sortDirection=desc&showAs=posts

    https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html?highlight=policy#

  • wg ipv4 route bug

    2
    0 Votes
    2 Posts
    520 Views
    A

    Adding 0.0.0.0/0 in WG Allowed IP for the Peers does not add it to the routing table and will not interfere with the routing table. You can validate this by looking at Diagnostics > Routes.

    https://docs.netgate.com/pfsense/en/latest/vpn/wireguard/routing.html

  • [Solved] Client subnet not accessible (and no internet)

    33
    0 Votes
    33 Posts
    6k Views
    arrmoA

    @ab5g Will do, thanks!

  • Traffic Graphs weird behaviour

    5
    1 Votes
    5 Posts
    861 Views
    stephenw10S

    It's because in this particular case we had been testing Wireguard internally before it was announced on CE. The bug was noted there and a report opened.

    Steve

  • Client-Mode?

    3
    0 Votes
    3 Posts
    665 Views
    jimpJ

    Generally speaking, you can configure it as a peer to a remote provider. It's all in how you set it up.

    See https://docs.netgate.com/pfsense/en/latest/recipes/wireguard-client.html for an example.

  • Can Interface public key be made optional?

    12
    0 Votes
    12 Posts
    2k Views
    jimpJ

    I haven't tried using those values so I'm not certain if they would actually work as expected. I'd rather err on the side of caution and make users enter them.

  • WireGuard, Two Firewall Entries

    6
    0 Votes
    6 Posts
    961 Views
    arrmoA

    @vbman213 That link helps, appreciate it!

  • 0 Votes
    2 Posts
    742 Views
    jimpJ

    @vbman213 said in Routing Issue when Using 'WireGuard' interface group versus individual wireguard interfaces:

    For testing purposes I have a simple pass all rule on both WG0 and WG1 OPT interfaces. However, when I created a test remote access wireguard tunnel and created a generic pass all rule on the built-in WireGuard Interface Group, this broke the scenario above. As soon as I delete the generic pass all rule on the WireGuard interface group, the scenario above starts working again. I can work around this by creating a more specific rule in the WireGuard interface group rules to only pass traffic sourced from the remote access tunnel subnet, but I still find it weird that a pass all rule in the wireguard group breaks things, but a pass all rule in the individual WG OPT interfaces doesn't.

    Rules on the group tab don't get reply-to so return routing follows the routing table. Rules on the assigned interface tab get reply-to so packets matching those rules will exit back out the interface they entered.

    That's how it's always worked on any interface type, not new to WireGuard.

  • Wireguard S2S Tunnel Gateway IP?

    12
    0 Votes
    12 Posts
    1k Views
    jimpJ

    @dem said in Wireguard S2S Tunnel Gateway IP?:

    @jimp It sounds like the field can only take one address, either IPv4 or IPv6, since "address" and "gateway" are singular in the description.

    I noticed that after I replied. I changed it to say "addresses" and added "(comma separated)" which should help.

  • WireGuard Connection Status

    Moved
    8
    0 Votes
    8 Posts
    3k Views
    jimpJ

    Yeah there is nothing like that in the wg output on FreeBSD. Not that I've seen yet anyhow.

  • WireGuard overriding static routes

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ

    WireGuard is a learning experience for all of us!

    We're still refining the GUI labels and documentation to hopefully make all this more clear.

  • Connecting using WAN CARP VIP

    3
    0 Votes
    3 Posts
    623 Views
    jimpJ

    How it works with HA is still a bit up in the air -- we're still testing/refining that.

    See my notes on https://redmine.pfsense.org/issues/11302#note-3 for example

  • WireGuard doesn't come up at boot

    11
    0 Votes
    11 Posts
    1k Views
    demD

    OK don't blame VirtualBox, blame me.

    I think the issue was that I didn't have "Hardware Clock in UTC Time" set in VirtualBox so the system clock was jumping when NTP kicked in which disrupted something, perhaps crypto-related.

    Sorry for my error.

  • Specify outbound interface (priority) for WG

    13
    0 Votes
    13 Posts
    1k Views
    jimpJ

    @vbman213 said in Specify outbound interface (priority) for WG:

    Would policy routing This Firewall in a floating rule be used to push WG tunnel traffic over a preferred gateway or gateway group? There seems to be some discussion on Reddit suggesting that this is also possible too instead of changing the default gateway.

    Maybe, but that's always been a bit iffy -- It's worth trying, but if you do, carefully check the state table and packet captures to ensure that the traffic is exiting the correct interface with the correct address. A problem you might get into there is that it leaves, say, WAN2 with the source set to WAN1. Outbound NAT could work around that if it happens, but it's kinda ugly.

    The problem is that pf policy routing influences packets that are already fully formed and on an interface, whereas the routing table also influences source address selection for UDP packets. So sure policy routing can change how a packet exits, but it can't change the address from which WireGuard sends the packet.

  • add wireguard bgp route mode

    8
    0 Votes
    8 Posts
    2k Views
    yon 0Y

    wg interface config ipv4 and ipv6 address,
    eg: 10.0.0.102/32, 2a0d:2400:12:c::102/128
    but the interface only has ipv4.

  • WireGuard Server Behind Home Router

    9
    0 Votes
    9 Posts
    3k Views
    stephenw10S

    'Real soon now!'

    But yeah, it is close. We had to disable the public snapshots while we got all the changes in order and there are still a few things the need to be resolved.

    Steve

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.