Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    I made a WireGuard package for pfSense

    Scheduled Pinned Locked Moved pfSense Packages
    178 Posts 40 Posters 117.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      wion
      last edited by

      Greetings to all! And immediately I apologize for my English. Dear Ascrod, the wireguard service does not start if I specify several Allowed IPs in the peer settings. If one is Allowed IPs, then the service starts.
      I'm using 2.4.5-RELEASE-p1 (amd64)
      FreeBSD 11.3-STABLE

      W 1 Reply Last reply Reply Quote 0
      • W
        wion @wion
        last edited by

        @wion

        @wion said in I made a WireGuard package for pfSense:

        Greetings to all! And immediately I apologize for my English. Dear Ascrod, the wireguard service does not start if I specify several Allowed IPs in the peer settings. If one is Allowed IPs, then the service starts.
        I'm using 2.4.5-RELEASE-p1 (amd64)
        FreeBSD 11.3-STABLE

        the problem was adding subnet 172.20.0.0/20. Until I changed the mask to / 16, the service did not work

        1 Reply Last reply Reply Quote 0
        • T
          Talisker @alirz
          last edited by

          @alirz You will have to reinstall the wireguard package, but not reconfigure the firewall.

          1 Reply Last reply Reply Quote 0
          • P
            pepe00
            last edited by

            I have upgraded to 2.4.5-p1, based on FreeBSD 11.3-STABLE.

            I have uninstalled the old version of wireguard, but cannot install the new one.

            I am trying to download "wireguard-go-0.0.20200320.txz" and "wireguard-1.0.20200513.txz" for FreeBSD: 11: amd64 without success.

            Could someone share it or upload it somewhere?

            1 Reply Last reply Reply Quote 0
            • P
              pepe00
              last edited by

              I have got it:

              https://pkg.freebsd.org/FreeBSD:11:amd64/quarterly/All/wireguard-1.0.20200827.txz

              https://pkg.freebsd.org/FreeBSD:11:amd64/latest/All/wireguard-go-0.0.20200320.txz

              A B 2 Replies Last reply Reply Quote 0
              • A
                alirz @pepe00
                last edited by

                will a reinstall of the new WG modules keep the WG config in place or will have to reconfigure it again.

                1 Reply Last reply Reply Quote 0
                • B
                  burntoc @pepe00
                  last edited by burntoc

                  @pepe00 said in I made a WireGuard package for pfSense:

                  https://pkg.freebsd.org/FreeBSD:11:amd64/latest/All/wireguard-go-0.0.20200320.txz

                  Did this work for you? I am seeing the GUI, but the Generate button does nothing, nor does the generate peer config button, so I removed the packages fearing other things may not work either. Looking for a setup that works per the config instructions on 2.45p1.

                  Actually, I get this as well, and this is likely the issue but I've done nothing special to my 2.4.5-p1 install so I don't know why it would be unique to me:

                  Newer FreeBSD version for package wireguard-go:
                  To ignore this error set IGNORE_OSVERSION=yes

                  • package: 1104001
                  • running kernel: 1103507
                    Ignore the mismatch and continue? [y/N]: n
                  P L 2 Replies Last reply Reply Quote 0
                  • T
                    trevorstuart
                    last edited by

                    I've also posted this same question in the torguard forms, but my issue is far more related to routing than torguard itself so I'm hoping someone can point me in the right direction.
                    I got wireguard in pfsense and all is fine with wireguard itself(at least I think it's not the issue)
                    Now want to direct some traffic out wireguard and other traffic out WAN
                    Once I connect the wireguard all NON-vpn devices lose access to the Internet - they can still communicate with each other inside the network but lose the ability to do anything internet based. However my VPN devices are working as they should, I haven't confirmed they are doing DNS properly yet as I want to get my other devices working first.
                    To get wireguard working I used steps from:
                    https://forums.torguard.net/index.php?/topic/1975-ascrod-ashus-pfsense-pkg-wireguard-tutorial-guide/
                    Worked well, only "issue" was figuring out the repo's and current version stuff...

                    Basically I only have a few hosts to send out wireguard, the majority will use WAN (including DHCP clients)
                    I'd like to take a group of IP's and make those go out the VPN, and anything else not.
                    WAN interface has public internet IP - 68.x.x.x
                    LAN gateway, this is gateway on all devices - 192.168.1.1
                    DHCP Range - 192.168.1.130 - 192.168.1.254

                    Created an alias:
                    image.thumb.png.261db8db74a186192d01ee1b04317ea8.png

                    configured NAT/Outbound - Hybrid Outbound
                    I THINK this is allowing the wanted "protected" devices out via the VPN - this is good and what I'm wanting.
                    image.thumb.png.a6f1b6a3730a2cf424395cd273a33b63.png

                    In Firewall/Rules/LAN I have the following:
                    image.thumb.png.a911ff7976c74baaac071037c330a78d.png

                    Most examples for building this type of routing rules have involved openVPN and are from 2015. While this should be getting me close I still am not getting it to work. The things i"ve read indicate that the VPN connection should become a second gateway, and I'd just set that as the gateway on the VPN devices. However when I bring the wireguard connection up there is no second gateway getting auto-magically created. Do I have to create one? Shouldn't the rules I've put in place allow the flow of traffic over VPN, and if not meeting VPN then it flows over regular?

                    T R 2 Replies Last reply Reply Quote 0
                    • AshusA
                      Ashus
                      last edited by

                      While risking getting banned, I wanted to inform you guys I've decided to move over to opnSense. It is an open-source pfSense fork where official authors do keep it up-to-date with latest technologies and support Wireguard natively.

                      1 Reply Last reply Reply Quote 2
                      • kiokomanK
                        kiokoman LAYER 8
                        last edited by

                        I don't think there is any problem, people are free to choose what they want, and for a home user maybe opnSense can be a good choice, for me it's a question of who to trust
                        someone with more stuff without quality check or someone with less stuff but rock-solid?
                        in my case, quality over quantity was my answer

                        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                        Please do not use chat/PM to ask for help
                        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                        1 Reply Last reply Reply Quote 0
                        • T
                          trevorstuart @trevorstuart
                          last edited by

                          @trevorstuart Everything I've been reading on setting up the routing so some goes out VPN and the rest not indicates I should have a second gateway. But I'm only seeing my original default gateway?
                          Will a new gateway appear when wireguard is connected?

                          A 1 Reply Last reply Reply Quote 0
                          • R
                            RumMonkey69 @johnpoz
                            last edited by

                            @johnpoz This would be handy, a nice guide on setting up a box until PfSense are ready.

                            1 Reply Last reply Reply Quote 0
                            • R
                              RumMonkey69 @trevorstuart
                              last edited by

                              @trevorstuart If this is anything like how I send traffic out via OpenVPN , then you need to set that protected Alias to go out via the WIREGUARD as a gateway, you can create a gateway.

                              T 1 Reply Last reply Reply Quote 0
                              • T
                                trevorstuart @RumMonkey69
                                last edited by

                                @RumMonkey69 created a gateway and set the VPN alias to use that. But it's still sending all traffic out the VPN, not just the IPs in the alias.

                                1 Reply Last reply Reply Quote 0
                                • T
                                  trevorstuart
                                  last edited by

                                  I now have the split traffic going the way I want.
                                  It required changing the Default LAN to any rule to specifically use the "real" Gateway. Seems wireguard becomes the pfsense "default" so the built in LAN to any rule stops functioning...

                                  1 Reply Last reply Reply Quote 0
                                  • P
                                    pepe00 @burntoc
                                    last edited by

                                    @burntoc You are right, the packages and the gui are installed, but it doesn't work correctly.

                                    The problem is that the repositories for FreeBSD11 no longer work and I can't find the correct packages.

                                    Could anyone help us find the packages for 2.4.5_p1 or FreeBSD11?

                                    1 Reply Last reply Reply Quote 0
                                    • U
                                      ubernupe
                                      last edited by ubernupe

                                      Dear pepe00,
                                      Hello and I hope that you are well and safe. I wrote a tutorial walk through for this whole process and posted it here below :

                                      https://forums.torguard.net/index.php?/topic/1975-ascrod-ashus-pfsense-pkg-wireguard-tutorial-guide/

                                      The bottom line is that you should use this FreeBSD repo mirror located in South Africa :

                                      http://pkg0.jinx.freebsd.org/FreeBSD:11:amd64/latest/All/
                                      for pfSense 2.4.5_p1 and for

                                      pfsense 2.5.0 this repo below :
                                      http://pkg0.jinx.freebsd.org/FreeBSD:12:amd64/latest/All/
                                      Again the tutorial pretty much explains all - once again look at :

                                      https://forums.torguard.net/index.php?/topic/1975-ascrod-ashus-pfsense-pkg-wireguard-tutorial-guide/

                                      Peace and Be and Stay Well

                                      M 1 Reply Last reply Reply Quote 1
                                      • S
                                        svenruben
                                        last edited by

                                        Hey Ascrod, thanks for your great work!!! would you be able to make that work for a clustered environment (pfSense High Availability)? and a second idea: would it be complicated to make your WEB-GUI working for more than one interface?

                                        thanks again! Cheers, Sven.

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          Meizel @ubernupe
                                          last edited by

                                          @ubernupe

                                          Nice work ;)

                                          I have A Netgate SG-3100 running 2.4.5-RELEASE-p1 (arm) built on Tue Jun 02 17:45:24 EDT 2020 FreeBSD 11.3-STABLE

                                          Is there A install for that?

                                          I'm now running this error.

                                          pkg: wrong architecture: FreeBSD:11:amd64 instead of FreeBSD:11:armv6
                                          

                                          Thanks in advance.

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            AB5G
                                            last edited by

                                            Hi all - A question on routing with Wireguard

                                            I have Wireguard setup pfSense acting as a VPN concentrator (Road Warrier) and also as a Site to Site connection.
                                            From my local pfSense I want to be able to use the site-2-site connection , reach the remote Wireguard server and then break out to internet from there. I have successfully configured this.

                                            To get this to work I use 0.0.0.0/0 in the allowed-IP of peer-config in the pfSense.

                                            As you you would imagine this also adds a default route to the pf routing table (with a higher pref than the local route ) and all LAN traffic then starts flowing over the site-to-site tunnel. What I want to get to is use this site-2-site tunnel for only certain LAN devices and not all. So for instance my appleTV behind pfSense could use this and break out to the internet from the remote Wireguard server.

                                            What have I have explored

                                            1. Tried to change the gateway of the other devices to the WAN_DHCP - this breaks a few things for me
                                            2. Tried adding Table = off in the peer config to prevent this route from getting added. Does not work
                                            3. Adding specific IP's to the peer config instead of default will not work as administrative headache of maintaining those is too high.

                                            PFsense Wireguard config

                                            [Interface]
                                            Address = 10.100.100.1/24
                                            ListenPort = 51820
                                            DNS = 192.168.11.5
                                            PrivateKey = xxxx

                                            [Peer]
                                            PublicKey = yyyy
                                            AllowedIPs = 0.0.0.0/0

                                            Route Table after activating Wireguard Site to Site tunnel.

                                            Screenshot 2020-12-22 at 8.26.11 AM.png

                                            L 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.