interested to know what more you're running on the crashing instances. Mine has been doing fine and I've tinkered with my zenarmor installation, putting the db in ram etc. Aside from zenarmor I'm only using suricata, so not much that can interfere.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Arby on March 13, 2025, 01:36:31 AMDo you know if there's a way to keep this working while simultaneously running a home VPN for my own devices? I had a road warrior wireguard setup for my devices, but every configuration for Mullvad seems incompatible with it. I'm not entirely sure why, but I think it's because the outbound NAT rule for the road warrior setup interferes with the outbound NAT rule for the Mullvad setup. I'm not entirely sure how to work around this though.
Interface Source Source Port Destination Destination Port NAT Address NAT Port Static Port Description
WAN WGHOME net udp/ * * udp/ * Interface address * NO NAT wgHome Internal
WGSTO1 selectiveRoute * * * Interface address * NO NAT wgSTO-1 SelectiveRoute
Quote from: cami09 on January 13, 2025, 08:31:46 AMBig thank you first!
Now a question: what is the best practice in case of multiple (Mullvad) WiregGuard instances?
Quote from: falsifyable_entity on December 16, 2024, 11:35:44 AMNope, not even one VLAN, besides Unbound I have pretty much nothing going on
Quote from: falsifyable_entity on December 13, 2024, 11:48:40 AMQuote from: newsense on December 13, 2024, 03:58:57 AMYou didn't answer my question about power mgmt features enabled in the BIOS...
Sorry, my bad, there are no power saving related settings in the BIOS, the only one I would consider close is auto boot when power is supplied.
Quote from: Seimus on November 24, 2024, 05:35:43 PM
An Idea here, maybe its stupid maybe not but...
What if this is included into the Official OPNsense docs?
Currently the docs do not have any Guide how to deploy OPNsense into Proxmox. Its easy to spin off OPNsense in Proxmox but "best practices" are another thing.
Would it be beneficial for the people to have something like that in the Official docs?
Regards,
S.
Quote from: OCT0PUSCRIME on October 23, 2024, 08:50:23 PM
Can I ask why your routing rule is different than the one in the OPNsense docs? They have a floating rule, direction out.
Quote from: hushcoden on October 14, 2024, 02:35:08 PM
If I understood properly, there is no need of rules within the actual Wireguard/VPN interface, but only in the interface where the hosts live, is that correct?
Tia.
Navigate to: System > Firmware > Plugin
- Install WireGuard Navigate to: VPN > WireGuard > Settings > Instances
| Field | Value |
| --------------- | ------------------------------ |
| Name | Instance Name |
| Pub Key | From Mullvad .conf creation* |
| Priv Key | Value of "PrivateKey" in .conf |
| Port | 51820 | * leave empty for random or specify manually
| Tunnel Address | Value of "Address" in .conf |
| Disable Routes | CHECKED |
| Gateway | Tunnel_Address (-1)** |
Navigate to: VPN > WireGuard > Settings > Peers
| Field | Value |
| ------------------- | ---------------------------- |
| Name | Peer Name |
| Pub Key | Value of "PublicKey" in .conf|
| Allowed IPs | 0.0.0.0/0 |
| Endpoint Address | Value of "Endpoint" in .conf |
| Endpoint Port | 51820 |
| Instance | The one you set up earlier |
| Keepalive internal | 25 |
Navigate to: VPN > WireGuard > Settings > General
- Enable WireGuardNavigate to: Interfaces > Assignments > Assign
a new interface
Navigate to: System > Gateways > Configuration
| Field | Value |
| ------------------------------- | -------------------------------------------------|
| Name | GW name |
| Interface | wg1 |
| Address Family | IPv4 |
| IP Address | Value of "Address"(-1) in .conf* |
| Far Gateway | CHECKED |
| Disable Gateway Monitoring | UNCHECKED |
| Monitor IP | 10.64.0.1 (An internal Mullvad DNS) |
Navigate to: Firewall > Aliases
| Field | Value |
| ----------------- | ---------------------------------------------- |
| Name | [selected hosts] - any name you want |
| Type | Host(s) |
| Content | Add the IP of each device to Selectively Route |
Navigate to: Firewall > Rules > Floating
| Field | Value |
| -------------------- | ------------------------------|
| Action | Pass |
| Quick | CHECKED |
| Interface | Interface(s) where your [selected hosts] live
| Direction | In |
| TCP/IP Version | IPv4 |
| Protocol | Any |
| Source | [selected hosts] |
| Destination | Any |
| Gateway | WG Gateway |
| Show Advanced Features |
| SET local tag | NO_WAN_EGRESS | * for kill switch
Navigate to: Firewall > NAT > Outbound
| Field | Value |
| ------------------------| ---------------------------------------------- |
| Interface | WG interface |
| TCP/IP Version | IPv4 |
| Protocol | Any |
| Source | [selected hosts] |
| Src Port | Any |
| Destination | Any |
| Dst Port | Any |
| Translation / Target | Interface Address |
(curl https://am.i.mullvad.net/json).Content | ConvertFrom-Json
Quote from: sy on January 07, 2024, 09:47:12 AM
Hi,
We need more info for the higher Mem usage issue. Please share a report by following the instructions in the below link.
https://www.zenarmor.com/docs/support/reporting-bug