Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense WireGuard and the the Android Client

    WireGuard
    2
    13
    2.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sigma
      last edited by sigma

      Since 23.05 the Wireguard Package is availlable for Download.
      I tried now since a while to configure a setup for accessing the network with the android client of WireGuard. Until now I have no success. I tried to combine different setup examples found on the net but it don't works. In the android app protocol I get "Handshake did not complete after 5 seconds"

      Does anybody have a working config with WireGuard on pfSense and the android client and can show here a sample config of the pfsense and the android client? I'll try again, and if I get it to work I'll send a example config here.
      Thanks for helping.

      Bob.DigB 1 Reply Last reply Reply Quote 0
      • Bob.DigB
        Bob.Dig LAYER 8 @sigma
        last edited by

        @sigma How about you show your not working config, it is much more fun this way. 😉

        S 1 Reply Last reply Reply Quote 0
        • S
          sigma @Bob.Dig
          last edited by

          @Bob-Dig
          I'll do this this evening or tomorrow.

          I think there's a missmatch with the public Keys and / or ip addresses. Maybe I try first to fix it. If it works or not I'll provide the screen shots here.

          1 Reply Last reply Reply Quote 0
          • S
            sigma
            last edited by

            It is sold and works now. The problem was a Key missmatch I guessed. Here my Settings.

            pfSense configuration:

            General Settings:

            b60e4979-7809-4347-ae47-932b303cbfc2-grafik.png

            Tunnel Setting:

            071797e1-136b-489f-bda5-175026da69a2-grafik.png

            Peer Setting:

            7fcc3682-63b0-4498-9658-016370e76f54-grafik.png

            WireGuard Roule(s):

            fac83ba4-55ac-4397-b538-031aef857270-grafik.png

            WAN Roule:

            4f264aa8-21d4-42e4-9e0f-e80360c422e3-grafik.png

            Key1: Public Key from Tunnel Setting pfSense
            Key2: Public Key From Client (here Android).
            Key3: Preshared Key: optional

            Now the Android Client Settings:

            21a065da-08b8-4260-a39f-c00fb96e2885-grafik.png

            Bob.DigB 1 Reply Last reply Reply Quote 0
            • S
              sigma
              last edited by

              Tunnel Subnet is:

              10.6.210.0/24

              The IP-Adress 10.6.210.1 must be entered ind the Wireguard Interface (here OPT20). This interface must be Assigned.

              6b234635-3020-410b-a9a1-3ed9a5ba2235-grafik.png

              8688a3b4-b075-4b60-96c9-c2974131c621-grafik.png

              All other Addresses 10.6.210.2 - 10.6.210.254 are for the peers

              No firewall roules are needed for the interface. Only roules for the WireGuard Group (see post before).

              1 Reply Last reply Reply Quote 0
              • Bob.DigB
                Bob.Dig LAYER 8 @sigma
                last edited by

                @sigma said in pfSense WireGuard and the the Android Client:

                WAN Roule:

                Better chose "WAN address" instead of "This firewall (self)", especially on WAN. 😉

                S 1 Reply Last reply Reply Quote 0
                • S
                  sigma @Bob.Dig
                  last edited by

                  @Bob-Dig
                  Ok Thanks for the hin. I think a security reason. But Why? What's the difference?

                  Bob.DigB 1 Reply Last reply Reply Quote 0
                  • Bob.DigB
                    Bob.Dig LAYER 8 @sigma
                    last edited by Bob.Dig

                    @sigma said in pfSense WireGuard and the the Android Client:

                    What's the difference?

                    One is only the WAN-address, the other is every interface pfSense has to offer. So no need to use the latter in a WAN-rule.

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      sigma @Bob.Dig
                      last edited by

                      @Bob-Dig
                      Ok, that make sense. I change all "this firewall" to the wan devices for which the roule is needed. I have 3 WAN devices (10Gbit Fiber, DSL and 5G Backup). On the 2 wired I have VPN roules (OpenVPN and Wireguard). And then are there some LAN Subnets some with VLAN's some direkt interfaces on the appliance. In the meantime the whole thing is a bit complex for a home firewall ;). I expect a 25Gbit's also synchronous internet connection this year and so I channged from a virtual pfSense to an appliance which is much more performant. With this lines I can do some interesting tests with VPN, so I heards from WireGuard and now I'll test it.

                      With wireguard I also found out that it seems to have problems to resove internal DNS names. I provide the internal DNS server in the DNS files of wirequard config. But it seems not to work. So local SMB shares could not be connected by their names over the WireGuard VPN. But it works fine with OpenVPN. Connect SMP shares with ip address works fine. I saw here some posts with the same problem. I'll have a look to this postings later. At the moment it's ok, WireGuard basically works and I can do some speedtests.

                      Bob.DigB 1 Reply Last reply Reply Quote 0
                      • Bob.DigB
                        Bob.Dig LAYER 8 @sigma
                        last edited by

                        @sigma said in pfSense WireGuard and the the Android Client:

                        With wireguard I also found out that it seems to have problems to resove internal DNS names. I provide the internal DNS server in the DNS files of wirequard config. But it seems not to work.

                        Working fine here. Try 10.6.210.1 as DNS-server.

                        S 3 Replies Last reply Reply Quote 0
                        • S
                          sigma @Bob.Dig
                          last edited by

                          @Bob-Dig
                          The tunnel Gateway as DNS? I try it.

                          1 Reply Last reply Reply Quote 0
                          • S
                            sigma @Bob.Dig
                            last edited by

                            @Bob-Dig
                            Don't works. The firewall don't knows the dns names, so i normaly use the AD server as DNS server, so all internal hosts could be resolved. But WireGuard works not this way.
                            I made now 2 host overrides in the DNS Forwarder and now the hosts will be recogniced. But I think it also should go the other way round.

                            1 Reply Last reply Reply Quote 0
                            • S
                              sigma @Bob.Dig
                              last edited by

                              This post is deleted!
                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.