Quote from: franco on February 23, 2022, 02:06:04 PM
I'm sure we will be adding a widget, but first let's get everyone up and running :)
Cheers,
Franco
Thanks Franco and an entirely understandable plan.
Appreciate all the work you do.
Best wishes
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: franco on February 23, 2022, 02:06:04 PM
I'm sure we will be adding a widget, but first let's get everyone up and running :)
Cheers,
Franco
Quote from: tracerrx on February 20, 2022, 08:06:37 PMQuote from: chbmb on February 20, 2022, 10:30:42 AM
For me the only thing that is lacking with the new DynamicDNS plugin is the lovely widget from the old one.
Agree, would be nice to have the widget back!
Quote from: Northguy on November 07, 2021, 10:25:35 PM
@chbmb What is the objective with the NAT rule? I have enabled only the uPNP (in the same way you did) to achieve Type 2 NAT.
Quote from: hushcoden on November 07, 2021, 01:23:02 PM
Actually you don't need uPNP, my PS4 works perfectly with just that Nat -> Outbound rule.
root@opnsense:~ # cat /usr/local/etc/ddclient.conf
daemon=300
syslog=yes # log update msgs to syslog
pid=/var/run/ddclient.pid # record PID in file.
ssl=yes
#
# setup how we expect to retrieve an IP address
#
use=web, web=http://checkip.dyndns.org/, web-skip="Current IP Address:"
use=if, if=pppoe0, \
protocol=cloudflare, \
zone=domain.tld, \
login=my.email@gmail.com, \
password=mycloudflare API key \
domain.tld
2022-02-20T09:05:56 Notice ddclient[17589] 64046 - [meta sequenceId="1"] SUCCESS: domain.tld -- Updated Successfully to xxx.xx.xxx.xxx
Quote from: mimugmail on December 23, 2019, 12:52:21 PM
@ownerer: if you want to start from scratch, disable OpenVPN stuff and do a packet capture on the WG interface to check if packets are traversing the tunnel. I need screenshots of FW rules and outbound NAT. The interface has to be with no ip configuration and if you touch it you need to restart wireguard
Quote from: spants on December 15, 2019, 08:45:38 PM
Thanks for the offer.... I just got it working.
I made a stupid mistake: in the servers list, I used the multihop Port instead of the standard port!
Juts now changing all my Rules to use Wireguard instead of PIA
Thanks again for the offer of help.
QuoteIn sum, pick a random IP like 1.2.3.4, add it to endpoint in addition to 0.0.0.0, add it to gateway in local instance and hit disable routes, assign wg interface, add a gateway with ip 1.2.3.4 and far gateway, then create firewall rules with 1.2.3.4 as gateway.
Quote from: spants on December 04, 2019, 08:01:16 PM
Count me in as another user trying to do the same!.
I have everything running on PIA OpenVPN (including routing for ports/devices) but wanting to switch to Mullvad Wireguard after the recent news.....
I have the wireguard server running on my opnsense - it's awesome!
(hi CHBMB - from another unraid guy!)
Quote from: mimugmail on December 04, 2019, 08:06:23 PM
I fixed it with him, he will write a guide
Quote from: mimugmail on December 04, 2019, 05:53:35 AMYeah, will do when I get back from work and we'll try and work out a time. Thanks for that!
Can you ping me via IRC? I can have a look via Teamviewer
Quote from: tusc on December 03, 2019, 10:20:59 PM
Count me as another user trying to get wireguard to work with policy based routing. I tried months ago with no luck. Hopefully someone figures it out.
Quote from: actionhenkt on November 28, 2019, 10:59:23 PM
I have tried to get this working with mullvad aswell, got it working once for 10minutes. I will try again this weekend if I can get it stable I can share the configuration with you.
QuoteI noticed you use hybrid nat on your wan and your source on it is any, the auto nat rules also contain your mullvad interface on wan, im not sure the manual nat rule for the mullvad interface will work here.. have you tried manual outbound nat ?
QuoteI would also then remove the source "lan net" from your lan rule and make it source any and put the mullvad gateway back into your lan in rule to test if it works at all
Quote(if it does you can try an alias containing ip's as source next). You could also try to set a local tag on the lan in rule and match the tag on the outbound nat rule for the mullvad interface (in a manual nat configuration).