• WG 0.1.6 can't hit peer device

    4
    0 Votes
    4 Posts
    1k Views
    T
    @tquade What do I do to move this along. I can provide screen captures, logs, etc. This functioned OK prior to 0.1.6. Ted
  • Wireguard and SG-1100 - Won't Handshake

    Moved
    3
    0 Votes
    3 Posts
    1k Views
    cmcdonaldC
    @ligistx-0 I test on several hardware platforms, including the 1100. No issues to report in regards to arm platforms. Can you report your package versions from the WireGuard > Status page ? WireGuard is a very quiet protocol, meaning that it won't "come alive" unless there is actually traffic to pass down the tunnel.
  • Point to Point VPN WAN Port Open?

    3
    0 Votes
    3 Posts
    786 Views
    perikoP
    Hello. In my case both Pf has public IP, went I setup WG P2P at first I don't have to open ports, WG open the sockets and don't add any value for keepalive. If I delete all setup and delete WG from both pfsenses, this issue appear, I have to open udp port for wg in one side because start blocking the packets. My questions is, in a standard setup like this one, do wg open the sockets or we need to open the port in the WAN always? Or what is the right steps? To understand more how WG is working, thanks Chris.
  • Wireguard VPN Adapter that allows GIGE Vision protocol

    2
    1
    0 Votes
    2 Posts
    760 Views
    cmcdonaldC
    @bubbel I see you're using a TAP device, which is L2. WireGuard only operates at L3 so if this protocol relies on L2 ethernet frames, you won't be able to tunnel that through WG without an additional inner tunnel that can pass L2 frames. That is technically possible but not trivial to configure.
  • System log: tun_wg0: loop detected

    4
    0 Votes
    4 Posts
    2k Views
    P
    @cmcdonald Thanks for responding. The problem was solved in another thread: https://forum.netgate.com/topic/168357/system-log-tun_wg0-loop-detected?_=1640196156974
  • Manually Change Public Key?

    2
    0 Votes
    2 Posts
    855 Views
    cmcdonaldC
    @seanbts You can enter a private key to reuse a key. If you only have the public key, you can't reuse it as a private key cannot be derived from a public key.
  • WG 0.1.6 no peer status

    5
    0 Votes
    5 Posts
    1k Views
    cmcdonaldC
    This actually reminded me that there are some UI bits in 0.1.6 that are not available on 2.5.2/21.05... I should probably re-version 0.1.6 to be 0.2.0 to reflect that change. Hmmm
  • Installation of new development version 0.1.6 WireGuard package

    4
    0 Votes
    4 Posts
    1k Views
    B
    @luckman212 It's now appearing in the pfSense package manager, at least for 2.6.0-devel.
  • Issue: how can I send DNS queries through Wireguard tunnel

    7
    0 Votes
    7 Posts
    1k Views
    M
    @bcruze I'm not sure what outbound NAT has to do with redirecting DNS queries. Can you explain it to me please? What should I change to redirect the VPN interface's DNS queries through the VPN gateway? Thank you
  • DNS Not Working With Phone As Peer

    10
    4
    0 Votes
    10 Posts
    2k Views
    P
    @dma_pf said in DNS Not Working With Phone As Peer: @bingo600 @GenericStudent Thanks to both of you for all of your help. I spent several hours this morning working on this issue and finally got it resolved. It was a combination of 3 different issues that resolved it. Before I get to the solution I want to clarify that the setup I have is using a dedicated assigned interface with a gateway assigned to it for the remote access tunnel. Like this: [image: 1629556090788-496c0552-b686-48e8-a473-ed95c64c0ead-image.png] [image: 1629556151436-181b3442-cdf2-4a90-b875-77cbdcbb8e3a-image.png] I found that first issue I had was the NAT Rule I posted above was not needed: [image: 1629558762176-a5d6906c-2253-4acc-9819-437e134e3175-image.png] The second issue I had was the NAT Rule I posted above was also not needed: [image: 1629556213714-d47715d8-e06f-4300-bef7-254f91def188-image.png] The reason it is not needed is because the 10.0.9.0 network is already know to pfsense through the assignment of that network to the wireguard interface and gateway. If there was no local pfsense interface assigned to that wireguard tunnel then the NAT rule would have been required. The third issue was exactly what @bingo600 pointed out. I did need to create a rule to allow the 10.0.9.0 network to assess the DNS resolver like this: [image: 1629557160885-62e2c01a-58db-42f3-b0a0-7414fceaa19d-image.png] I am very perplexed as to why that allow rule had to be created. The setting I posted above, [image: 1629557347859-d707a8d1-46f5-481e-8b49-caf358dfdbb1-image.png] should have allowed the DNS queries as the 10.0.9.0 network is a local pfsense network. The pfsense cleary indicates that by selecting "All" there should not need an allow rule. Per the pfsense documentation: [image: 1629559002137-ab33f227-2fc2-4c90-a98e-9f56e85c129e-image.png] [image: 1629557782577-5ac51888-b59e-4150-8021-6bd37b34c152-image.png] I'm obviously misunderstanding something about why that access rule is required. If you can help me understand that better I'd greatly appreciate it. Thank you guys for all of your help. I've been trying to figure this issue out for several weeks and your input got me pointed in the right direction to get it resolved. Thank you so much for this post. I was experiencing exactly the same issue and you helped to fix it!
  • Upgrade from 0.1.5_1 to 0.1.5_3 - service won't start if_wg.ko issue

    1
    0 Votes
    1 Posts
    787 Views
    No one has replied
  • WireGuard Road Warrior setup

    9
    0 Votes
    9 Posts
    2k Views
    D
    @cmcdonald said in WireGuard Road Warrior setup: This isn't necessary for assigned tunnel interfaces as pfSense already appends these subnets to the Unbound config, but for unassigned tunnel interfaces this additional "step" is required. It should be automatic. @hulleyrob said in WireGuard Road Warrior setup: yes it was I had the exact same thing happen to me. I have a Wireguard tunnel installed as an interface for my road warrior set up. I could not get it to resolve until I created in ACL for Unbound. This drove me nuts for days, the details are all in this thread https://forum.netgate.com/topic/165818/dns-not-working-with-phone-as-peer?_=1637700225107 It seems to me that there is an issue/bug where the Wireguard tunnel is not recognized by Unbound and therefore Unbound does not see the interface as an internal network and therefore requires the ACL.
  • WireGuard 0.1.5_3

    5
    0 Votes
    5 Posts
    1k Views
    B
    @cmcdonald Thanks for the info. I took the plunge and updated this "lab" 2100 to 22.01-devel from 21.09-RC and, sure enough, WG was also updated to 0.1.5_3.
  • Wireguard on PF has defeated me

    3
    0 Votes
    3 Posts
    1k Views
    G
    I feel you because I am dealing with a similar situation with pf wireguard. PIA is my VPN provider. Their linux app on ubuntu VM runs fine. PIA also has a tool to generate wireguard conf file to work with wg-quick on ubuntu. No problem. I generate the details in my ubuntu wireguard conf and enter the info in pf gui. Mapping is private key for tunnel. Endpoint and public key for peer. Address for opt interface and routing. The pf wireguard peer does not always handshake. The first time pf wireguard connected to PIA it was perfect. The connection dropped after 2 weeks. Now the connection has long ping times and very slow. Is there a way to automate mapping linux wireguard conf to pf wireguard tunnel and peer conf?
  • Laptop to server with personal WG, but then outside with mullvad WG

    2
    0 Votes
    2 Posts
    810 Views
    cmcdonaldC
    @kodols Sure. You would create a 'site-to-site' style tunnel between pfSense and Mullvad, and then a second tunnel using the road warrior model. Then it just becomes a matter of setting up policy routing and firewall rules to accomplish the desired outcome.
  • No outgoing request from Wireguard server

    2
    0 Votes
    2 Posts
    814 Views
    cmcdonaldC
    @xiki It isn't clear if and how this is related to pfSense.
  • connecting to same subnet using public domain address over wireguard.

    1
    0 Votes
    1 Posts
    563 Views
    No one has replied
  • Filter Reload error for WireGuard Rule

    1
    0 Votes
    1 Posts
    549 Views
    No one has replied
  • WireGuard Widget

    3
    1
    0 Votes
    3 Posts
    1k Views
    M
    @cmcdonald said in WireGuard Widget: @ciscox Noted! Thanks. That is particular useful for widgets that can be added multiple times to the dashboard, so it might also be worth allow multiple widgets with each filterable by specific tunnels. Hi, Exactly what I was thinking.:)
  • WireGuard Tunnel restore configuration

    1
    0 Votes
    1 Posts
    716 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.