OPNsense Forum
English Forums => 23.7 Legacy Series => Topic started by: Zapad on November 30, 2023, 10:49:35 am
-
until update 23.7 Wireguard worked... after Updates no.
Now i can do what i want it dies not work? is this known?
what ist to do?
Workaround? patch?
Searching Web get me no solution, but asks from other users have the same Problem.
My Clients send Connection and receve nothing from Server, not over Wan not over Lan too.
-
You are probably having the same issues as other users >
https://forum.opnsense.org/index.php?topic=37248.0
Reapply your NAT settings & FW Rules
Regards,
S.
-
You are probably having the same issues as other users >
https://forum.opnsense.org/index.php?topic=37248.0
Reapply your NAT settings & FW Rules
Regards,
S.
Can you be more specific about your issue? Is this an issue with endpoints connecting to your Opnsense Wireguard instance? Or is the issue endpoints behind Opnsense not being able to use a Wireguard tunnel to a VPN provider?
-
first thing what i was try was reapplying und deleting and reassign all firewall and nat rules.
applying # opnsense-patch 64e0867a4
and newstart does not help.
what now?
-
"Can you be more specific about your issue? Is this an issue with endpoints connecting to your Opnsense Wireguard instance? Or is the issue endpoints behind Opnsense not being able to use a Wireguard tunnel to a VPN provider?"
My Endpoints cannot connect to OPNSense wireguard, because no Answer from server.
Not from Wan "myddns:51820" and not over lan.
both was possible.
-
are the clients using FQDNs or IP addresses to connect? Are they going to the correct Opnsense wan address?
-
all other clients can connect over fqdn without any problem.
like "myddns.com:10240 or other port forwarded.
-
For me too, it is uncertain. Sometimes it connects, sometimes it doesn't. Sometimes I reach the NAS, sometimes not. :(
-
all other clients can connect over fqdn without any problem.
like "myddns.com:10240 or other port forwarded.
Can you snip out from the client logs the connection failure. It would be interesting to see what it shows. If possible you could also do a Wireshark/tcpdump from the client to see the handshake.