Got it working with help from deepseek ai:
- Create NAT Port Forward rule
- Go to Firewall > NAT > Port Forward
- Click "Add" to create a new rule
- Configure with these settings:
- Interface: LAN
- Protocol: TCP/UDP (or your specific protocol)
- Destination: VPN provider's public IP (the one assigned to your WireGuard tunnel)
- Destination port range: The port forwarded by your VPN provider
- Redirect target IP: Your host's LAN IP
- Redirect target port: The local port on your host
- Description: e.g., "Hairpin NAT for VPN host access"
- Filter rule association: "Add associated filter rule"
- Verify Firewall Rule
- Go to Firewall > Rules > LAN
- Look for a rule that allows traffic to your host's LAN IP on the specified port
- Add Outbound NAT Rule
- Go to Firewall > NAT > Outbound
- Enable "Hybrid outbound NAT rule generation"
- Add a manual rule:
- Interface: LAN
- Source: LAN net
- Destination: Your host's LAN IP
- NAT Address: Your OPNsense LAN IP
- Static Port: Checked