So turns out it might have been a bug in opnsense 25.1.5, since upgrading to 25.1.6 the issue seems to have stopped, at least the tunnels are not dropping anymore.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menu[Interface]
.......
PrivateKey = *****
Address = 10.2.0.2/32
DNS = 10.2.0.1
[Peer]
.....
PublicKey = *****
AllowedIPs = 0.0.0.0/0
Endpoint = 11.11.11.11:51820
[Interface]
.......
PrivateKey = *****
Address = 10.2.0.2/32
DNS = 10.2.0.1
[Peer]
.....
PublicKey = *****
AllowedIPs = 0.0.0.0/0
Endpoint = 22.22.22.22:51820
none wg pubkey < PrivateKey
Enabled | Checked |
Name | Call it whatever you want, like the exit country (eg CH60) |
Public Key | Insert the derived PublicKey from the previous step |
Private Key | Insert the PrivateKey field from the [Interface] section |
Listen Port | A unique port, 51820 or above 51820 for first instance 51821 for the second |
MTU | Needs to be 80 bytes shorter than normal MTU. Default 1420 (1500 - 80 = 1420?) 1420 Some suggest 1412? |
DNS Server | Leave blank |
Tunnel Address | Insert the Address field from the [Interface] section in CIDR format, 10.2.0.2/32 for the first instance 10.3.0.2/32 for the second instance Some suggest /30 or /28? |
Peers | Leave blank for now |
Disable Routes | Checked |
Gateway | Tunnel address -1 10.2.0.1 for the first instance 10.3.0.1 for the second instance |
Enabled | Checked |
Name | Call it whatever you want, like the exit country (eg CA60) |
Public Key | Insert the PublicKey field from the [Peer] section |
Allowed IPs | 0.0.0.0/0 |
Endpoint address | Insert the IP address from the Endpoint field in the [Peer] section |
Endpoint port | Insert the port number from the Endpoint field in the [Peer] section 51820 for both |
Instances | Select the instance configured in the previous step |
Keepalive interval | 25 |
Enable | Checked |
Lock | Checked |
Description | Same as under Assignments, if this box is not already populated |
IPv4 Configuration Type | None |
IPv6 Configuration Type | None |
Name | Name them same as the interfaces VPN0 VPN1 |
Description | Add one if you wish to |
Interface | Select the newly created interfaces in the dropdown |
Address Family | Select IPv4 in the dropdown |
IP address | Insert the gateway IP that you configured under the WireGuard Instance configuration 10.2.0.1 for the first instance 10.3.0.1 for the second instance |
Far Gateway | Checked |
Disable Gateway Monitoring | Unchecked |
Disable Host Route | Checked |
Monitor IP | Insert the Endpoint IP from the config file |
Group Name | VPN_GROUP |
VPN0 | Tier 1 |
VPN1 | Tier 2 (failover) |
Trigger Level | Packet Loss or High Latency |
Name | IG_OUT_WAN |
Description | Interfaces allowing outbound WAN traffic |
Members | Select vlans that will not go through the VPN |
Name | IG_OUT_VPN |
Description | Interfaces allowing outbound VPN traffic |
Members | Select vlans that will go through the VPN |
Enabled | Checked |
Name | RFC1918 |
Type | Select Network(s) in the dropdown |
Content | Option 1: 192.168.0.0/16 10.0.0.0/8 172.16.0.0/12 Option 2: select all opt networks and lan network |
Description | All local networks |
Action | Pass |
Quick | Checked |
Interface | IG_OUT_VPN |
Direction | in |
TCP/IP Version | IPv4 |
Protocol | any |
Source / Invert | Unchecked |
Source | IG_OUT_VPN net |
Destination / Invert | Checked |
Destination | Select the RFC1918 Alias you created above in the dropdown |
Destination port range | any |
Description | wireguard |
Gateway | Select the gateway group you created above VPN_GROUP |
Set local tag | NO_WAN_EGRESS The NO_WAN_EGRESS local tag will be used for the killswitch to prevent traffic leaking out if a tunnel is down |
Action | Pass |
Quick | Checked |
Interface | IG_OUT_VPN |
Direction | in |
TCP/IP Version | IPv4 |
Protocol | UDP |
Source / Invert | Unchecked |
Source | IG_OUT_VPN net |
Destination / Invert | Unchecked |
Destination | 224.0.0.251/24 |
Destination port range | for both from and to select (other) 5353 |
Description | Allow multicast mDNS traffic |
Action | Block |
Quick | Checked |
Interface | IG_OUT_VPN |
Direction | out |
TCP/IP Version | IPv4 |
Protocol | any |
Source / Invert | Unchecked |
Source | any |
Destination / Invert | Unchecked |
Destination | any |
Destination port range | any |
Description | Killswitch |
Match local tag | NO_WAN_EGRESS |
Interface | Select the interface for your WireGuard VPN VPN0 VPN1 |
TCP/IP Version | IPv4 |
Protocol | any |
Source invert | Unchecked |
Source address | IG_OUT_VPN net |
Source port | any |
Destination invert | Unchecked |
Destination address | any |
Destination port | any |
Translation / target | Interface address |