• WireGuard, pfSense and IPv6 Track Interface

    6
    0 Votes
    6 Posts
    1k Views
    S
    @eirikrcoquere I do the same I just had to think about what the service provider was doing so now I have IPv4 and IPv6 up and working with no problems.
  • Win PCs over wireless

    4
    0 Votes
    4 Posts
    814 Views
    4
    @johnpoz I'm using WPA2 Personal. Although the OpenWRT supports WAP3, i don't believe the laptops support it. Need to double-check. But thought it is not secure during the initial handshaking. Not really au fait with it, but am paranoid about security - All access points support WPA3 just checked
  • Wireguard configuration backup

    6
    0 Votes
    6 Posts
    3k Views
    cmcdonaldC
    @dehumanizer77 HA syncing is not supported (yet). No timeline on this. But generally speaking, yes the entire package config is backed up as part of the package section backup for pfSense (make sure you check the Keep Configuration in WireGuard \ Settings page).
  • two tunnels one wan

    7
    0 Votes
    7 Posts
    2k Views
    thebabufrikT
    @galt007 You have to create/ add interface with ip address from mullvad (/32), make them as gateway, create gateway groups, routing, nat, and rules for lan. for illustration: https://forum.netgate.com/topic/169466/multi-wan-multi-tunnels-peers-wireguard-vpn-load-balancing-failover
  • Error creating adapter

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • WG connection doesn't allow for browsing

    9
    0 Votes
    9 Posts
    989 Views
    D
    @p-dang thanks, this fixed it!
  • Wireguard For Remote Access - And Local access

    3
    0 Votes
    3 Posts
    852 Views
    F
    @netblues I tried that, split dns and used just a simple webservice to try it. Kinda works.. but not really. I think the DNS name might be the problem. I have Cloudflare as external DNS provider, there I can change the TTL for the record to a minimum of one minute, that might work. Howerver, the internal name in DNS resolver I cannot change TTL so there it uses the default TTL of 3600 seconds. So.. leaving the house would break communications for about 15 minutes every time, not so good... Without using NAT Reflection mode (that do not work for UDP) does anyone know a creative solution to this?
  • WireGuard remote client access to home media servers

    2
    0 Votes
    2 Posts
    790 Views
    M
    @mipucket So after researching this more it appears that SSDP won't work because multicast isn't supported in WireGuard? There seems to be a bug report generated for this 11 months ago. Is this correct? Has anyone been able to get UPnP working for a WireGuard client?
  • Upgraded WG to 0.1.5_4 Wireguard missing from VPN Dropdown

    1
    0 Votes
    1 Posts
    365 Views
    No one has replied
  • Doubts about projektte amn Wireguard

    3
    0 Votes
    3 Posts
    664 Views
    E
    Hello, I am in a project that I would like to do. These are VPN tunnels with Wireguard. There is information on the internet that talks about the client network and the server network and the 2 networks connected by the Wireguard VPN tunnel, but this project that I have has some peculiarities and is also expected to grow easily. I consult you to start this idea correctly and not have to make changes halfway through the growth. I have: Wireguard server installations (server: Ubuntu), behind the server there is an ethernet network (192.168.100.x), where there are servers that collect data from clients. The engineering facilities, there is the client/server (to be defined) Wireguard (Debian/Ubuntu to be defined), in the ethernet network (range to be defined), there are the engineers who would connect in a timely manner to the clients to make modifications of code. The client installations, there is a Wireguard client (Peer: Debian), on the ethernet network (range to be defined), there are the computers that have the data. Peculiarities: The servers going through Ubuntu + VPN + Debian, would take the data, from the computers of all the clients, that are behind the Wireguard Debian client. Therefore, the servers can connect to all clients. Between clients they cannot be seen. Engineers going through Debian/Ubuntu + VPN + Debian would change code, from all client machines, behind the Wireguard Debian client. Therefore, engineers can connect with all clients. So seeing the peculiarities, you could recommend me missing IP ranges, as well as 'AllowedIPs' and 'Endpoint' of each 'Peer' and I'm not sure if I would have to configure routing. Thanks in advance, I'm new here and just looking to confirm that I start the project correctly. Best regards, Edu
  • Show Originial IP

    1
    0 Votes
    1 Posts
    392 Views
    No one has replied
  • Is WG Production-Ready?

    5
    0 Votes
    5 Posts
    1k Views
    N
    @cmcdonald Thanks - I'll give it a test!
  • WireGuard lives!

    Locked
    90
    4 Votes
    90 Posts
    35k Views
    cmcdonaldC
    @slim0287 that repository is no longer active because the project is now sponsored and maintained in-house. v0.1.6 is available in 22.01/2.6RC branches. There is a UI dependency that makes v0.1.6 incompatible with older versions of pfSense. I’d recommend giving the release candidates a try, they are quite close to GA.
  • Endpoint IP - Peer vs WG vs Status

    6
    3
    0 Votes
    6 Posts
    1k Views
    C
    The easiest solution to prevent the openvpn reloads / restarts is just to disable the Gateway Alarm Actions. But still unsure why the status > peers endpoint IP is not being displayed correctly, I think it is picking up the previous / old one.
  • Pfsense Crashed After Upgrading To 0.1.5_3

    3
    0 Votes
    3 Posts
    839 Views
    S
    revised-pfsense-crash-dump.txt
  • 0 Votes
    1 Posts
    435 Views
    No one has replied
  • 3 Votes
    3 Posts
    739 Views
    cmcdonaldC
    @deltaend All great suggestions and I agree with them. Will add this to the list of things to work on.
  • Wireguard Gateway Status

    8
    1
    0 Votes
    8 Posts
    2k Views
    cmcdonaldC
    @hossimo ha glad to hear it's working! Sometimes the simplest mistakes are the hardest to hunt down. I hit that more than I'd like to admit.
  • 0 Votes
    3 Posts
    835 Views
    J
    @netblues Thanks for the suggestion. As it happens I already had that bit right, but I stupidly overlooked including the 98 subnet as an allowed IP for the WireGuard tunnel - so problem solved! Thanks again.
  • torguard vpn and wireguard

    5
    0 Votes
    5 Posts
    1k Views
    Y
    thanks Chris, now I see where mi mistake is. will try tomorrow.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.