At my wits end trying to get this working, hoping someone here can set me back on the right track -
use case: 3x Smartphones, 3x laptop computers wish to access the Home LAN over a VPN when away from home
I’ve enabled Wireguard, and setup 1 client for each. Installed the official Wireguard app and configured.
My phone works, but I can’t get any other device to complete the handshake. This happens regardless of wireguard being active on my phone, and it happens on wifi or off wifi.
(1) Make sure you dont have empty/null settings… and I suspect your doing it to ‘hide’ stuff.
However using that syntax is confusing. The peer settings for allowed IPs on the MT dont need keep alive or endpoint etc…
(2) Not showing the full config is not helpful ! For example only showing some of the firewall rules is not all that helpful …
I cannot comment on them as they are not there and they can impact your success.
as far as this rule…UDP is not required. add action=accept chain=input comment=“allow WireGuard traffic” src-address=10.0.0.0/24
(3) Why are you mangling ??? Reason?
(4) Very strange set of dst-nat rules, what are you trying to accomplish there??
++++++++++++++++++++++++++++++++
So far dont see major issues but then again you dont have the complete config presented.
Hey Anav, thanks for responding. I tried to snip my config for brevity. Sorry it made it more confusing; I’m still learning about most of this and my configuration is far from clean so I tried to keep it to the relevant parts. The IP mangles and additional DNS stuff in my firewall rules are intended to be for a captive dns, I was following a tutorial earlier this year and it seemed to work. If it’s suboptimal, that’s good to know and I can revisit that. Here’s the full config, if you’re interested. https://pastebin.com/PM6YGCC5
Superstar! This was exactly the issue. I had setup the config for my phone over SSH, but the others in the Web Config, causing the empty “endpoint address”. So subtle lol.
Yeah I would be leery of copying code not because its dangerous, but because if you dont understand it, then it may not be actually meeting the requirement, or at least in an optimal manner.
The requirement is what I was looking for. What are you trying to do with DNS??
Valid point! I added the mangle for logging/debugging something at the time - though I don’t recall what. It’s just noise, and the rules were disabled - now deleted.
The DNS use case is for filtering. I want all DNS traffic not destined for my 2 internal DNS servers (Primary: 192.168.88.211, Secondary: 88.226) to be redirected to the primary, unless it’s the DNS servers themselves hitting quad-9, or if the traffic is on vlan 107.