+1 to this please. I had a picture on my dashboard of some family that passed away, and it was always nice to go to my dashboard and see the image... Would really love to see this come back please.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: CJ on October 02, 2023, 04:47:21 PM
What does your config look like? Did you change any other settings besides setting up WG?
Also, I want to clarify something. Are you attempting to initiate traffic from the OPNSense side to the client and that's not what's working? Or are you initiating traffic from the client side to OPNSense?
What do your WG configs look like? Are you using IPs, domains, etc?
Quote from: CJ on September 20, 2023, 05:30:12 PM
What do you mean by not being part of a major update? OPNSense uses the YY.MM.minor_patch version format. Updating from 23.1 to 23.7 is not a minor update and was actually the biggest update change I've seen from the project so far. There have been a lot of information and posts about the changes and how it would affect things and not be as simple as prior updates.
Quote from: newsense on September 19, 2023, 09:50:17 PM
With properly configured (V)Lan rules the only traffic the FW will do over the WAN link is as follows:
- WAN configuration, IPv4/IPv6
- bogons/opnsense updates -- which are all signed
- NTP traffic - which can be secured with Chrony
Even if your scope would be possible - which I highly doubt since it would create a loop - none of the three outlined activities above would be justified for VPN only.
QuoteWe don't have any guide / official support for OPNsense neither do we do any testing on it.
You can read this:
https://docs.opnsense.org/manual/how-tos/wireguard-client-mullvad.html
Best regards,
QuoteI got it setup now to where the whole network still can connect to the internet, but the firewall itself still goes through my real IP - but it has internet now. I wanted to share the routes comparison of "disable routes" being checked, vs when it's not.
When leaving "Disable routes" unchecked (default), my connectivity breaks. Here are the routes that get generated from this:
default [GATEWAY IP] UGS igb0
0.0.0.0/1 link#14 US wg1
[PRIV_VPN_IP] link#14 UH lo0
[REAL_HOMEIP] link#1 UHS lo0
localhost link#6 UH lo0
128.0.0.0/1 link#14 US wg1
192.168.0.0/28 link#9 U bridge0
[FW_HOSTNAME] link#9 UHS lo0
where "GATEWAY IP" is my ISP's gateway ip address. When checking "Disable Routes" and setting the Gateway IP to "10.64.0.1", I get this:
default [GATEWAY IP] UGS igb0
10.64.0.1 link#14 UHS wg1
[PRIV_VPN_IP] link#14 UH lo0
[REAL_HOMEIP] link#1 UHS lo0
[REAL_HOMESUB]/24 link#1 U igb0
localhost link#6 UH lo0
192.168.0.0/28 link#9 U bridge0
[FW_HOSTNAME] link#9 UHS lo0
The diff on these is (- not working, + working):
- 0.0.0.0/1 link#14 US wg1
- 128.0.0.0/1 link#14 US wg1
+ 10.64.0.1 link#14 UHS wg1
+ [REAL_HOMESUB]/24 link#1 U igb0
Note, that I _cannot_ use 100.64.0.3 as the DNS server... I *have* to do 10.64.0.1 - I'm guessing this is because my firewall is not going through the VPN tunnel? Not entirely sure, but I've basically minimized my settings to the above. I also now have the following 2 firewall rules on the LAN interface:
Direction: in | Protocol: any | Source: LAN Net | Destination: LAN Net over any | Gateway: default
Direction: in | Protocol: any | Source: LAN Net | Destination: any over any | Gateway: Mullvad
(i.e. no rule specific to DNS).
Quote from: n-dolce on September 17, 2023, 06:38:35 PM
Thank you. I saw your thread earlier and after reading the pfsense guide I got it working as well. First I needed to manually add a gateway for IPv4 as instructed for pfsense (IP for the GW is 10.64.0.1, which is the IP of Mullvads IPv4 proxy) and then modified the "allow LAN to anywhere"-rule to use the gateway. It works fine now, I think I will be able to make it work from here. As a helpful note, if you are looking to make IPv6 work as well you can get the IPv6 address for the IPv6 gateway with the following snipped.curl https://ipv6.am.i.mullvad.net --socks5-hostname 10.64.0.1
Quote from: Renegade6476 on September 17, 2023, 03:22:46 AMQuote from: opn69a on September 15, 2023, 06:05:43 PM
be sure to update your firewall rules that have "outbound" traffic as your Wireguard's Gateway
Care to explain with a little more detail? I also have the issue, but i've already got an out firewall rule, and masquarading as the source of vpn in my setup. Thank you.