<wireguard> <server version="0.0.4"> <servers> <server uuid="4b5cee75-577f-4f41-8e26-d688f98ccd16"> <enabled>1</enabled> <name>wg1</name> <instance>1</instance> <pubkey>[REDACTED]</pubkey> <privkey>[REDACTED]</privkey> <port>51820</port> <mtu/> <dns>10.0.0.30</dns> <tunneladdress>10.0.1.1/24</tunneladdress> <disableroutes>0</disableroutes> <gateway/> <peers>5826191e-13b1-4d53-8540-58b00c2c78d5</peers> </server> </servers> </server> <general version="0.0.1"> <enabled>1</enabled> </general> <client version="0.0.7"> <clients> <client uuid="5826191e-13b1-4d53-8540-58b00c2c78d5"> <enabled>1</enabled> <name>iOS01</name> <pubkey>[REDACTED]</pubkey> <psk/> <tunneladdress>10.0.1.2/32</tunneladdress> <serveraddress/> <serverport/> <keepalive/> </client> </clients> </client> </wireguard>
<nat> <outbound> <mode>hybrid</mode> <rule/> </outbound> <rule> <protocol>tcp/udp</protocol> <interface>lan</interface> <category/> <ipprotocol>inet</ipprotocol> <descr>Allow PiHole to reach external DNS servers</descr> <tag/> <tagged/> <poolopts/> <associated-rule-id/> <nordr>1</nordr> <source> <address>10.0.0.30/24</address> </source> <destination> <any>1</any> <port>53</port> </destination> <updated> <username>root@10.0.0.107</username> <time>1674785066.7003</time> <description>/firewall_nat_edit.php made changes</description> </updated> <created> <username>root@10.0.0.107</username> <time>1674781322.0168</time> <description>/firewall_nat_edit.php made changes</description> </created> </rule> <rule> <protocol>tcp/udp</protocol> <interface>lan</interface> <category/> <ipprotocol>inet</ipprotocol> <descr>Intercept any outgoing DNS queries and redirect them to PiHole.</descr> <tag/> <tagged/> <poolopts/> <associated-rule-id>nat_63d321d5164c60.99056460</associated-rule-id> <target>10.0.0.30</target> <local-port>53</local-port> <source> <network>lan</network> </source> <destination> <address>10.0.0.30/24</address> <not>1</not> <port>53</port> </destination> <updated> <username>root@10.0.0.107</username> <time>1674783657.6567</time> <description>/firewall_nat_edit.php made changes</description> </updated> <created> <username>root@10.0.0.107</username> <time>1674781141.0927</time> <description>/firewall_nat_edit.php made changes</description> </created> </rule> </nat> <filter> <rule uuid="71167ca6-d6a2-414c-a1e5-444754a3e404"> <type>pass</type> <interface>wan</interface> <ipprotocol>inet</ipprotocol> <statetype>keep state</statetype> <direction>in</direction> <quick>1</quick> <protocol>udp</protocol> <source> <any>1</any> </source> <destination> <network>wanip</network> <port>51820</port> </destination> <updated> <username>root@10.0.0.107</username> <time>1675680437.0935</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>root@10.0.0.107</username> <time>1675680437.0935</time> <description>/firewall_rules_edit.php made changes</description> </created> </rule> <rule uuid="9e0ebb67-5dd9-441f-a704-2e1396437977"> <type>pass</type> <interface>lan</interface> <ipprotocol>inet</ipprotocol> <statetype>keep state</statetype> <direction>in</direction> <quick>1</quick> <source> <network>lan</network> </source> <destination> <network>opt1</network> </destination> <updated> <username>root@10.0.0.107</username> <time>1675712245.7933</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>root@10.0.0.107</username> <time>1675712245.7933</time> <description>/firewall_rules_edit.php made changes</description> </created> </rule> <rule uuid="a141d439-92d0-4138-8b0e-9192a1f29a08"> <type>pass</type> <interface>lan</interface> <ipprotocol>inet</ipprotocol> <statetype>keep state</statetype> <direction>in</direction> <quick>1</quick> <source> <network>opt1</network> </source> <destination> <network>lan</network> </destination> <updated> <username>root@10.0.0.107</username> <time>1675712190.5965</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>root@10.0.0.107</username> <time>1675712190.5965</time> <description>/firewall_rules_edit.php made changes</description> </created> </rule> <rule uuid="d9dccc48-2d74-4e07-a560-41bdbed103d6"> <source> <network>lan</network> </source> <interface>lan</interface> <statetype>keep state</statetype> <protocol>tcp/udp</protocol> <ipprotocol>inet</ipprotocol> <destination> <address>10.0.0.30</address> <port>53</port> </destination> <descr>Intercept any outgoing DNS queries and redirect them to PiHole.</descr> <category/> <associated-rule-id>nat_63d321d5164c60.99056460</associated-rule-id> <created> <username>root@10.0.0.107</username> <time>1674781141.0917</time> <description>/firewall_nat_edit.php made changes</description> </created> </rule> <rule uuid="9c46069a-01d2-493b-8da7-f23a543ad197"> <type>pass</type> <ipprotocol>inet</ipprotocol> <descr>Default allow LAN to any rule</descr> <interface>lan</interface> <source> <network>lan</network> </source> <destination> <any/> </destination> </rule> <rule uuid="ac86a077-2add-43cb-b987-1735d867b6d9"> <type>pass</type> <ipprotocol>inet6</ipprotocol> <descr>Default allow LAN IPv6 to any rule</descr> <interface>lan</interface> <source> <network>lan</network> </source> <destination> <any/> </destination> </rule> <rule uuid="73cabe68-b833-46a0-bcec-524a0a13d0ce"> <type>pass</type> <interface>opt1</interface> <ipprotocol>inet</ipprotocol> <statetype>keep state</statetype> <direction>in</direction> <log>1</log> <quick>1</quick> <source> <network>opt1</network> </source> <destination> <any>1</any> </destination> <updated> <username>root@10.0.0.107</username> <time>1675682813.5935</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>root@10.0.0.107</username> <time>1675680539.5684</time> <description>/firewall_rules_edit.php made changes</description> </created> </rule> </filter>
[Interface]PrivateKey = [REMOVED]Address = 10.0.1.2/24[Peer]PublicKey = [REMOVED]AllowedIPs = 10.0.0.0/24, 10.0.1.1/32Endpoint = [REMOVED]:51820
I've seen this on this board a ton, not sure what tutorials you guys are following but you're doing this wrong.The client interface address should be the correct subnet mask, not a /32. The allowed IP's will be the /32. Specifically 10.0.1.2/32 for you.