Yeah! This was the only thing that didn't work out of the box when migrating from the fortigate and that was my own fault ;D
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Monviech on September 25, 2023, 06:22:19 AM
- Does your ubuntu home server have ufw enabled with firewall rules not allowing the wireguard IP range?
ufw status
- Also install tcpdump on your ubuntu server and run:
tcpdump -i any proto ICMP
And then ping from your laptop whilte its in wireguard and see if any paket gets there.
- Does your ubuntu server use the opnsense as default gateway?
- Also, is your server in a different subnet (vlan) than your other devices. Check the allowed IPs of Wireguard on your laptop to see if its either 0.0.0.0/0 or all IP ranges that you have at home. For example 192.168.1.0/24 172.16.1.0/24 etc... otherwise the paket isnt allowed through wireguard.
Quote from: Monviech on September 24, 2023, 10:03:05 PM
Probably MSS issue? Heres the fix:
Check the part about MTU and normalization rules (highlighted green)
https://github.com/opnsense/docs/pull/498/files#diff-ea8f32b1d3a75a756d1daaf6a9aefbdf601428e7ac7f21ba480f4d2ef1696f20
Configuration:
Setting Current Limit
Thread count 4 4
Default queue limit 256 10240
Dispatch policy direct n/a
Threads bound to CPUs enabled n/a
Protocols:
Name Proto QLimit Policy Dispatch Flags
ip 1 1000 cpu hybrid C--
igmp 2 256 source default ---
rtsock 3 256 source default ---
arp 4 256 source default ---
ether 5 256 cpu direct C--
ip6 6 1000 cpu hybrid C--
ip_direct 9 256 cpu hybrid C--
ip6_direct 10 256 cpu hybrid C--