Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    WireGuard site-to-site pfsense-to-pfsense no handshake?

    Scheduled Pinned Locked Moved WireGuard
    42 Posts 7 Posters 11.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jimbohello @Mikki-10
      last edited by Jimbohello

      @mikki-10
      openvpn never gave me problem ! maybe you have someting misconfigure !

      but listen bro ! theonemcdonald is working hard to fix thing.

      wireguard will live and rise but not yet :)

      i do know that wireguard in pfsense 2.5.0
      was working great for site to site but they kill it for reason ! so we will wait fow now

      maybe you should stop your openvpn instance for your testing purpose ! maybe you should do a backup and remove all openvpn ! i remember having issue when openvpn was there with wireguard site to site

      M 1 Reply Last reply Reply Quote 0
      • M
        Mikki-10 @Jimbohello
        last edited by Mikki-10

        @jimbohello

        Hi I know, I have followed he's youtube videos and github pagem, and wanted to jump head first when pfsense 2.5.2 was out, as the 2.5.0 WG just worked so well for me, and therefore hoped for the best, but I did not know how broken site-to-site was at this point, but I have not lost hope, and can't wait for the new WG to get better and more stable.

        But thanks for your help so fare, I will see if I can get it working somehow.

        J 2 Replies Last reply Reply Quote 1
        • J
          Jimbohello @Mikki-10
          last edited by

          @mikki-10
          like i said do backup remove all vpn and start from scratch only wireguard!

          never know

          anyway if problem just restore

          have a good one

          M 1 Reply Last reply Reply Quote 0
          • M
            Mikki-10 @Jimbohello
            last edited by

            @jimbohello

            Hi I am on OPT18 as the next interface, not gonna happen over night, plus all the firewall rules, that is a big one ๐Ÿ˜Š

            1 Reply Last reply Reply Quote 0
            • J
              Jimbohello @Mikki-10
              last edited by

              @mikki-10
              i tested on 2 pfsense today with no ovpn
              no problem

              ive did the same procedure on pfsense main office with lotโ€™s of ovpn nothing was going as expected so ! look like openvpn is messing some shit arround

              M 1 Reply Last reply Reply Quote 0
              • M
                Mikki-10 @Jimbohello
                last edited by Mikki-10

                @jimbohello

                There was a closed github issue like that but just with IPsec, same thing.

                J 1 Reply Last reply Reply Quote 0
                • J
                  Jimbohello @Mikki-10
                  last edited by Jimbohello

                  @mikki-10

                  question your openvpn problematic

                  is it on the clients side ? if so just add
                  nobind in the *.ovpn

                  nobind

                  that it

                  hereโ€™s the symptoms client connect but traffic is not goiing thru .

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    Mikki-10 @Jimbohello
                    last edited by

                    @jimbohello

                    It is also site-to-site pfsense-to-pfsense, not sure if that will do anything for that.

                    And other clients eg windows or linux, work just fine, but again that is an other tunnel in this case, but thanks for the tip ๐Ÿ˜Š

                    J 2 Replies Last reply Reply Quote 0
                    • J
                      Jimbohello @Mikki-10
                      last edited by Jimbohello

                      @mikki-10
                      hahahaha
                      i did some more digging !
                      this is hilarious !
                      now my wireguard SITEA GATEWAY is the ip of SITEB
                      and my SITEB GATEWAY is the ip of SITEA !
                      when the handshake occur all gateway are online !! and ping goes on !

                      absolutely ASOME OR RIDICULOUS
                      I PUT THE CONFIG BASE ON YOUR IP

                      Interface - Site 1
                      Description: WG
                      IPv4: Static IPv4
                      MTU: 1420
                      IPv4 Address: 192.168.77.1/24

                      Gateway- Site 1
                      Interface: WG
                      Name: WG_Gateway
                      IPv4 Address: 192.168.77.2/24

                      Interface - Site 2
                      Description: WG
                      IPv4: Static IPv4
                      MTU: 1420
                      IPv4 Address: 192.168.77.2/24

                      Gateway- Site 2
                      Interface: WG
                      Name: WG_Gateway
                      IPv4 Address: 192.168.77.1/24

                      1 Reply Last reply Reply Quote 0
                      • J
                        Jimbohello @Mikki-10
                        last edited by Jimbohello

                        @mikki-10
                        My SITEA

                        Screenshot_20210711_214917.png

                        1 Reply Last reply Reply Quote 0
                        • J
                          Jimbohello
                          last edited by Jimbohello

                          @jimbohello said in WireGuard site-to-site pfsense-to-pfsense no handshake?:

                          @mikki-10

                          @Mikki-10

                          MY SITEB

                          Screenshot_20210711_214917.png

                          M 1 Reply Last reply Reply Quote 0
                          • M
                            Mikki-10 @Jimbohello
                            last edited by

                            @jimbohello

                            Super nice, seems like we were able to help eachother out a bit then ๐Ÿ˜Š

                            I redid some of the steps, I now have one tunnel all working now!

                            Y 1 Reply Last reply Reply Quote 0
                            • Y
                              Yazur @Mikki-10
                              last edited by

                              @mikki-10 @Jimbohello

                              Hello,

                              I also have the same problem, site to site impossible with Wireguard on pfsense in version 2.5.2.
                              You mentioned OpenVPN, Wireguard and IPSEC in the conversation, is your last messages for solving the problem about Wireguard?

                              J 1 Reply Last reply Reply Quote 0
                              • J
                                Jimbohello @Yazur
                                last edited by

                                @yazur

                                yes the problem is solve with wireguard just read the complete post

                                Y 1 Reply Last reply Reply Quote 0
                                • Y
                                  Yazur @Jimbohello
                                  last edited by

                                  @jimbohello

                                  I have succeeded, in addition to adding the gateways on the interfaces, we must add the static routes.
                                  If you follow the netgate documentation everything should be automatic :D !

                                  J 1 Reply Last reply Reply Quote 0
                                  • J
                                    Jimbohello @Yazur
                                    last edited by

                                    @yazur

                                    already mentionned in that post

                                    static routing is up there

                                    just read carefully

                                    every thing is there

                                    cmcdonaldC 1 Reply Last reply Reply Quote 1
                                    • cmcdonaldC
                                      cmcdonald Netgate Developer @Jimbohello
                                      last edited by

                                      Updated documentation is something we are working on

                                      Need help fast? https://www.netgate.com/support

                                      1 Reply Last reply Reply Quote 2
                                      • M
                                        Mikki-10
                                        last edited by Mikki-10

                                        @yazur I will try to do my best to sum it up :)

                                        • Create a tunnel, on Site 1 and Site 2, eg change the port number if you do not like the default value, generate the keys for the site, it follows the setup as below.
                                        • Assign the interface (eg tun_wg0) and set a static IP, this is the tunnel network, set the MTU to 1420, see settings below, i use the subnet 192.168.77.0/24 in this exampel.
                                        • Set a firewall rule (UDP) to allow traffic on the WAN interface to the Wireguard tunnel port. (eg UDP port 51820 to WAN address on the WAN interface) (And no it is not a NAT rule (Port forward))
                                        • Set the needed firewall rules for WireGuard and the WireGuard interface WG
                                        • Add the peers, on both sites, where the public key for the peer is the opposite sites public tunnel key. At least one of the peers shall have an endpoint, the opposite can be dynamic. So the site that have and public IP, can have its peers to be dynamic, we can call that site the server (the site with an public IP) and the other sites for clientes (those eg behind a CGNAT) if you like. Also add Allowed IPs here, you will need to add the LAN IP and the tunnel IP subnets
                                        • Add the gateway, with the opposite sites tunnel IP.
                                        • The gateway should come online at this point and the handshake should now be green-
                                        • Now set the need static route on both sites

                                        Tunnel - Site 1
                                        Tunnel: tun_wg0 (Site 1)
                                        Public key: PK1

                                        Peer - Site 1
                                        Tunnel: tun_wg0 (Site 1)
                                        Endpoint: Dynamic
                                        Public Key: PK2
                                        Allowed IPs: <LAN Subnet of Site 2>
                                        Allowed IPs: 192.168.77.0/24

                                        Interface - Site 1
                                        Description: WG
                                        IPv4: Static IPv4
                                        MTU: 1420
                                        IPv4 Address: 192.168.77.1/24

                                        Gateway- Site 1
                                        Interface: WG
                                        Name: WG_Gateway
                                        IPv4 Address: 192.168.77.2

                                        Tunnel - Site 2
                                        Tunnel: tun_wg0 (Site 2)
                                        Public key: PK2

                                        Peer - Site 2
                                        Tunnel: tun_wg0 (Site 2)
                                        Endpoint: <Public IP of Site 1>
                                        Public Key: PK1
                                        Allowed IPs: <LAN Subnet of Site 2>
                                        Allowed IPs: 192.168.77.0/24

                                        Interface - Site 2
                                        Description: WG
                                        IPv4: Static IPv4
                                        MTU: 1420
                                        IPv4 Address: 192.168.77.2/24

                                        Gateway- Site 2
                                        Interface: WG
                                        Name: WG_Gateway
                                        IPv4 Address: 192.168.77.1

                                        M B 2 Replies Last reply Reply Quote 0
                                        • M
                                          Mikki-10 @Mikki-10
                                          last edited by

                                          @mikki-10 said in WireGuard site-to-site pfsense-to-pfsense no handshake?:

                                          Peer - Site 2
                                          Tunnel: tun_wg0 (Site 2)
                                          Endpoint: <Public IP of Site 1>
                                          Public Key: PK1
                                          Allowed IPs: <LAN Subnet of Site 2>
                                          Allowed IPs: 192.168.77.0/24

                                          I made a small mistanke, and can not edit my post?
                                          Allowed IPs: <LAN Subnet of Site 2> should be <LAN Subnet of Site 1>

                                          Peer - Site 2
                                          Tunnel: tun_wg0 (Site 2)
                                          Endpoint: <Public IP of Site 1>
                                          Public Key: PK1
                                          Allowed IPs: <LAN Subnet of Site 1>
                                          Allowed IPs: 192.168.77.0/24

                                          J 1 Reply Last reply Reply Quote 0
                                          • J
                                            Jimbohello @Mikki-10
                                            last edited by

                                            @mikki-10

                                            wow your nice guys

                                            every thing was already said in all the post for a pfsense user to do their jobs !

                                            reposting all the procedure was kind of useless but friendly :)

                                            have a nice one bro

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.