• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

pfSense WireGuard and the the Android Client

Scheduled Pinned Locked Moved WireGuard
13 Posts 2 Posters 2.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    sigma @Bob.Dig
    last edited by May 24, 2023, 4:57 PM

    @Bob-Dig
    I'll do this this evening or tomorrow.

    I think there's a missmatch with the public Keys and / or ip addresses. Maybe I try first to fix it. If it works or not I'll provide the screen shots here.

    1 Reply Last reply Reply Quote 0
    • S
      sigma
      last edited by May 25, 2023, 6:50 AM

      It is sold and works now. The problem was a Key missmatch I guessed. Here my Settings.

      pfSense configuration:

      General Settings:

      b60e4979-7809-4347-ae47-932b303cbfc2-grafik.png

      Tunnel Setting:

      071797e1-136b-489f-bda5-175026da69a2-grafik.png

      Peer Setting:

      7fcc3682-63b0-4498-9658-016370e76f54-grafik.png

      WireGuard Roule(s):

      fac83ba4-55ac-4397-b538-031aef857270-grafik.png

      WAN Roule:

      4f264aa8-21d4-42e4-9e0f-e80360c422e3-grafik.png

      Key1: Public Key from Tunnel Setting pfSense
      Key2: Public Key From Client (here Android).
      Key3: Preshared Key: optional

      Now the Android Client Settings:

      21a065da-08b8-4260-a39f-c00fb96e2885-grafik.png

      B 1 Reply Last reply May 25, 2023, 7:45 AM Reply Quote 0
      • S
        sigma
        last edited by May 25, 2023, 7:08 AM

        Tunnel Subnet is:

        10.6.210.0/24

        The IP-Adress 10.6.210.1 must be entered ind the Wireguard Interface (here OPT20). This interface must be Assigned.

        6b234635-3020-410b-a9a1-3ed9a5ba2235-grafik.png

        8688a3b4-b075-4b60-96c9-c2974131c621-grafik.png

        All other Addresses 10.6.210.2 - 10.6.210.254 are for the peers

        No firewall roules are needed for the interface. Only roules for the WireGuard Group (see post before).

        1 Reply Last reply Reply Quote 0
        • B
          Bob.Dig LAYER 8 @sigma
          last edited by May 25, 2023, 7:45 AM

          @sigma said in pfSense WireGuard and the the Android Client:

          WAN Roule:

          Better chose "WAN address" instead of "This firewall (self)", especially on WAN. 😉

          S 1 Reply Last reply May 25, 2023, 8:01 AM Reply Quote 0
          • S
            sigma @Bob.Dig
            last edited by May 25, 2023, 8:01 AM

            @Bob-Dig
            Ok Thanks for the hin. I think a security reason. But Why? What's the difference?

            B 1 Reply Last reply May 25, 2023, 8:10 AM Reply Quote 0
            • B
              Bob.Dig LAYER 8 @sigma
              last edited by Bob.Dig May 25, 2023, 8:17 AM May 25, 2023, 8:10 AM

              @sigma said in pfSense WireGuard and the the Android Client:

              What's the difference?

              One is only the WAN-address, the other is every interface pfSense has to offer. So no need to use the latter in a WAN-rule.

              S 1 Reply Last reply May 26, 2023, 6:36 AM Reply Quote 0
              • S
                sigma @Bob.Dig
                last edited by May 26, 2023, 6:36 AM

                @Bob-Dig
                Ok, that make sense. I change all "this firewall" to the wan devices for which the roule is needed. I have 3 WAN devices (10Gbit Fiber, DSL and 5G Backup). On the 2 wired I have VPN roules (OpenVPN and Wireguard). And then are there some LAN Subnets some with VLAN's some direkt interfaces on the appliance. In the meantime the whole thing is a bit complex for a home firewall ;). I expect a 25Gbit's also synchronous internet connection this year and so I channged from a virtual pfSense to an appliance which is much more performant. With this lines I can do some interesting tests with VPN, so I heards from WireGuard and now I'll test it.

                With wireguard I also found out that it seems to have problems to resove internal DNS names. I provide the internal DNS server in the DNS files of wirequard config. But it seems not to work. So local SMB shares could not be connected by their names over the WireGuard VPN. But it works fine with OpenVPN. Connect SMP shares with ip address works fine. I saw here some posts with the same problem. I'll have a look to this postings later. At the moment it's ok, WireGuard basically works and I can do some speedtests.

                B 1 Reply Last reply May 26, 2023, 6:48 AM Reply Quote 0
                • B
                  Bob.Dig LAYER 8 @sigma
                  last edited by May 26, 2023, 6:48 AM

                  @sigma said in pfSense WireGuard and the the Android Client:

                  With wireguard I also found out that it seems to have problems to resove internal DNS names. I provide the internal DNS server in the DNS files of wirequard config. But it seems not to work.

                  Working fine here. Try 10.6.210.1 as DNS-server.

                  S 3 Replies Last reply May 26, 2023, 7:21 AM Reply Quote 0
                  • S
                    sigma @Bob.Dig
                    last edited by May 26, 2023, 7:21 AM

                    @Bob-Dig
                    The tunnel Gateway as DNS? I try it.

                    1 Reply Last reply Reply Quote 0
                    • S
                      sigma @Bob.Dig
                      last edited by May 26, 2023, 8:03 AM

                      @Bob-Dig
                      Don't works. The firewall don't knows the dns names, so i normaly use the AD server as DNS server, so all internal hosts could be resolved. But WireGuard works not this way.
                      I made now 2 host overrides in the DNS Forwarder and now the hosts will be recogniced. But I think it also should go the other way round.

                      1 Reply Last reply Reply Quote 0
                      • S
                        sigma @Bob.Dig
                        last edited by May 26, 2023, 10:50 AM

                        This post is deleted!
                        1 Reply Last reply Reply Quote 0
                        12 out of 13
                        • First post
                          12/13
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received