Clients behind WireGuard-connected travel router can't use personal VPNs
-
Hi all,
I'm running a pfSense 2.7.2 box with dual WAN and a WireGuard server. I use a GL.iNet AX1800 travel router (OpenWRT) to establish a WireGuard tunnel back to my home when traveling (hotel use case).
The tunnel connects fine, clients behind the travel router get Internet — but only if they are not using their own VPN tunnel (e.g. each mobile phone can use the vpn-server on it's own too). If they keep theri VPN active (as we want), the connection breaks.
Goal
- Devices should always have personal VPNs enabled, even in hotel Wi-Fi.
- When behind the travel router's Wi-Fi, everything should "just work" — no toggling VPNs, no manual settings.
- At home this works seamlessly (ISP/Wi-Fi/personal VPN = all fine), but not behind the travel router.
Setup Summary
Home pfSense setup:
- WAN1 (ISP-A)
- WAN2 (ISP-B)
- Manual Outbound NAT
- WireGuard Server (e.g.
wg_server_home
with subnet172.18.0.0/24
) - Clients behind travel router get IPs like
172.18.0.2–6
Travel router (OpenWRT):
- WireGuard client to home
- IP:
172.18.0.6
- LAN:
192.168.8.0/24
- Masquerading enabled on VPN zone
What works
- Travel router successfully connects to pfSense VPN.
- Clients behind the router get internet if personal VPNs are OFF.
What fails
- Devices with VPN enabled fail to connect (no DNS, no traffic).
- VPN handshake succeeds, but traffic is dropped.
- Once personal VPN is off, internet resumes normally (but not secured if not in the hotel room with travel-router)
Current NAT Rules (simplified)
Interface Source NAT Address Purpose WAN_B 172.18.0.6/32 WAN_B addr Travel router should exit via WAN_B WAN_A 172.18.0.6/32 WAN_A addr Fallback (not ideal) WAN_A 172.18.0.0/24 WAN_A addr General rule for WG subnet
Policy Routing Rules
Interface: wg_server_home
Source: 172.18.0.6/32
Gateway: GW_WAN_B_PrioritySource: 172.18.0.2/32 (test phone)
Gateway: GW_WAN_A_Priority
Also tried a floating rule (match) for 172.18.0.2–.5 routed via different VPN gateways → same result.Observations
- WireGuard tunnel works.
- Outbound NAT works.
- DNS issues resolved by manually allowing router access to internal DNS.
BUT: When a client device behind the router tries to set up its own VPN, it fails unless the travel router’s WireGuard tunnel is turned off.
I suspect this is due to asymmetric routing or stateful firewall/NAT logic?
Question
How can I allow clients behind a WireGuard travel router to use their own VPNs, while the travel router itself is tunneled back to pfSense?
Bonus: Is it possible to selectively route the travel router's tunnel over one WAN, while allowing clients' personal VPNs to exit via a different WAN?
Any ideas welcome!
Let me know if there's a smarter approach or a trick we’re missing — thanks in advance!I know switching wg-tunnels would bei simple. But this has no women acceptance factor with wife/daughter....