• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Running Into Issue with VPN Mullvad Tutorial.

Scheduled Pinned Locked Moved WireGuard
12 Posts 5 Posters 1.5k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T
    Thenuge
    last edited by Thenuge Jul 19, 2021, 2:34 AM Jul 19, 2021, 2:30 AM

    First, Thank you Christian for the tutorial and all the work your doing. I am not an IT guy so bare with me guys.

    Followed the tutorial. More than once. I am running into an issue when we go into the system/routing/monitor IP. In the tutorials the gateways stay up but once I change my monitor ip's my gateways all go down.
    PFsense screen shot 1.png
    PFsense Screen Shot 2.png
    PFsense Screen Shot 3.png

    I get the hand shakes and everything seems fine till I switch the monitor IP address. I cannot figure out if I made a mistake or just something is different about my setup causing it to break.

    Any Ideas would be appreciated. I would love to get this setup so that I could tunnel in with my phone and access my nextcloud stuff and vpn out for internet.

    Running a Netgate xg-7100. Just did a master reset as I broke it trying to follow the IVPN wireguard tutorial. So my setting should be basically factory except for my vlans and static dhcp stuff.

    K 1 Reply Last reply Jul 19, 2021, 2:28 PM Reply Quote 0
    • K
      KOM @Thenuge
      last edited by Jul 19, 2021, 2:28 PM

      @thenuge Why are you changing the monitor IP? I used to have a WG link to Mullvad and I don't recall having to change that from default.

      T D 2 Replies Last reply Jul 19, 2021, 4:18 PM Reply Quote 0
      • T
        Thenuge @KOM
        last edited by Jul 19, 2021, 4:18 PM

        @kom from what I got from the video. The mullvad IP they give you will not actually work as a monitoring IP. Even if the gateway is down it will always show up because its an internal IP . By switching it to a real DNS location. I used 9.9.9.9 it actually provides a monitoring function and will show if your gateway is actually up or not.
        Changing the monitoring IP is not the reason my gateways are down (at least I don't think it is, again, not an expert.) But by doing this I am actually seeing that they are down. If I switch that back they will show online again.

        K C 2 Replies Last reply Jul 19, 2021, 5:05 PM Reply Quote 0
        • K
          KOM @Thenuge
          last edited by Jul 19, 2021, 5:05 PM

          @thenuge I never noticed an issue before but I don't run it anymore so I can't help you any further. Good luck with your issue.

          1 Reply Last reply Reply Quote 1
          • C
            cappie @Thenuge
            last edited by Jul 20, 2021, 4:29 PM

            @thenuge When I first set this up using the same tutorial (different provider) my gateways would go offline constantly as well.

            Coincidentally, for my monitoring IPs I was using 9.9.9.9, 8.8.8.8 and 1.1.1.1. I've since switched to using 8.8.4.4, 1.0.0.1 and 9.9.9.10 and so far these seem more 'reliable'. No constant gateway down notifications. May have been a fluke but that's my experience so far.

            What other addresses have you tried besides 9.9.9.9?

            1 Reply Last reply Reply Quote 0
            • D
              dma_pf @KOM
              last edited by Jul 20, 2021, 7:30 PM

              @thenuge said in Running Into Issue with VPN Mullvad Tutorial.:

              The Mullvad IP they give you will not actually work as a monitoring IP. Even if the gateway is down it will always show up because its an internal IP .

              That's correct. In setting up the wiregurd tunnels in pfsense you use the Mullvad IP for the Wireguard IP address of the pfsense wireguard gateway. So monitoring that address will always show that the interface is up because it's looking at the pfsense side of the tunnel. You need to use an IP address across the tunnel as the monitor IP.

              Try doing an traceroute from pfsense by way of each Mullvad interface. Note the IP addresses for the first and second hops in each of the traceroutes. Those addresses are usually always servers still within Mullvad's infrastructure. Do a ping test to those IPs. If they return responses try using them for the monitor IPs. Alternatively lookup Mullvad's DNS servers IPs and test them with a ping as well. They can work too if they respond to pings.

              I've found this to be way more stable than using something like 8.8.8.8, etc. which is dependent on many more hops routing across the internet to finally get to its destination.

              T 1 Reply Last reply Jul 21, 2021, 1:03 AM Reply Quote 0
              • T
                Thenuge @dma_pf
                last edited by Jul 21, 2021, 1:03 AM

                @dma_pf

                I have tried a bunch of DNS servers as different monitors but at this point I think this issue is a symptom of something else and not the actual issue. I believe my gateways are actually not working which is why the monitors are show them as down.

                The order in the picture goes.
                Packets in
                Packets out

                Bytes In
                Bytes Out

                Errors In
                Errors Out

                PFsense screen shot4.png

                Lots of errors.

                D 1 Reply Last reply Jul 21, 2021, 3:50 PM Reply Quote 0
                • D
                  dma_pf @Thenuge
                  last edited by Jul 21, 2021, 3:50 PM

                  @thenuge I think you might have an issue with either your firewall rules or your NAT rules. Can you post screenshots of them?

                  Also, do a ping test Diagnostics/Ping, with the Source Address as each of your Mullvad tunnels, to 8.8.8.8 and google.com. Do the tests come back correctly, if not which ones fail?

                  T 1 Reply Last reply Jul 22, 2021, 2:21 AM Reply Quote 0
                  • T
                    Thenuge @dma_pf
                    last edited by Jul 22, 2021, 2:21 AM

                    @dma_pf
                    I get nothing from the pings. None of them work.
                    pfsense screen shot 5.png

                    pfsense firewall rules.png

                    pfsense 6.png

                    D 1 Reply Last reply Jul 22, 2021, 4:54 PM Reply Quote 0
                    • D
                      dma_pf @Thenuge
                      last edited by Jul 22, 2021, 4:54 PM

                      @thenuge I do not use Mullvad, I use IVPN, but I did use Christian's video on setting up my IVPN interface group. My setup is working.

                      I have 3 different interfaces/tunnels set up to my provider. None of the interface's on my setup have any firewall rules set up in them. Same goes for the Wireguard Interface. They all look like this:

                      f5180c2b-e4f2-42aa-b89d-d694d44ffbbd-image.png

                      You do need to have a policy routing rule on the interface where your host are (LAN?) that are sending traffic across the tunnel to Mullvad. It would look like this:

                      28b9b6a4-7ef6-4433-8853-2beadf5cf10a-image.png
                      One thing to note. I'm pretty sure that Wireguard only transmits UDP packets. So any rule you would want to apply on the Mullvad interfaces would have to have UDP in the protocol.

                      As to NAT, it looks to me like you setup an Interface Group for your tunnels to Mullvad and then used that interface group to create one NAT rule for the 3 interfaces. That is how Christian did it in his video.

                      I originally set mine up without the interface group. So I had a NAT rule for each interface. Everything worked perfectly like that. I then created an interface group and created a single NAT rule using the interface group, as described in Christian's video, and everything broke. I could not get anything working across the tunnels. I undid the interface group and recreated the individual NAT rules for each interface and everything started working again. I've left it like that ever since and it's working fine.

                      You might want to get rid of the interface group and apply individual NAT rules to each interface and see if that fixes it.

                      T 2 Replies Last reply Jul 23, 2021, 3:23 AM Reply Quote 1
                      • T
                        Thenuge @dma_pf
                        last edited by Thenuge Jul 23, 2021, 3:28 AM Jul 23, 2021, 3:23 AM

                        @dma_pf The funny thing is I started off trying to use IVPN over mullvad but the public key / private key stuff was confusing me so I went with mullvad because they provided that file with everything nicely labeled like in the video. Figured I would switch back later once I got a better handle on everything unless I fell in love with mullvad.

                        I deleted the firewall rules, and the interface group and added a lan rule. Im going to keep messing with it and get back with an update asap.

                        1 Reply Last reply Reply Quote 0
                        • T
                          Thenuge @dma_pf
                          last edited by Jul 24, 2021, 3:43 AM

                          @dma_pf

                          Alright... I figured out my issue. I never added allowable IP's to 0.0.0.0 /0.
                          That problem is fixed but I still cannot get my lan traffic or my openvpn tunnel client to use those tunnels for internet. Road block after road block. I guess if this was easy everyone would do it.

                          1 Reply Last reply Reply Quote 0
                          12 out of 12
                          • First post
                            12/12
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received