<rule> <source> <network>UK_PVPN_34_HOSTS</network> </source> <destination> <any>1</any> </destination> <descr/> <category/> <interface>opt5</interface> <tag/> <tagged/> <poolopts/> <poolopts_sourcehashkey/> <ipprotocol>inet</ipprotocol> <created> <username>XXX</username> <time>1708187169.4968</time> <description>/firewall_nat_out_edit.php made changes</description> </created> <target/> <targetip_subnet>0</targetip_subnet> <sourceport/> <updated> <username>XXX</username> <time>1708191104.6149</time> <description>/firewall_nat_out_edit.php made changes</description> </updated> </rule>
<rule uuid="XXX"> <type>block</type> <interface>wan</interface> <ipprotocol>inet</ipprotocol> <tagged>NO_WAN_EGRESS</tagged> <statetype>keep state</statetype> <direction>out</direction> <floating>yes</floating> <quick>1</quick> <source> <any>1</any> </source> <destination> <any>1</any> </destination> <updated> <username>XXX</username> <time>1708187354.2587</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>XXX</username> <time>1708187354.2587</time> <description>/firewall_rules_edit.php made changes</description> </created> </rule> <rule uuid="XXX"> <type>block</type> <interface>wan</interface> <ipprotocol>inet</ipprotocol> <tagged>NO_WAN_EGRESS</tagged> <statetype>keep state</statetype> <direction>out</direction> <floating>yes</floating> <quick>1</quick> <source> <any>1</any> </source> <destination> <any>1</any> </destination> <updated> <username>XXX</username> <time>1708187354.2587</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>XXX</username> <time>1708187354.2587</time> <description>/firewall_rules_edit.php made changes</description> </created> </rule>
<rule uuid="XXX"> <type>pass</type> <interface>lan</interface> <ipprotocol>inet</ipprotocol> <statetype>keep state</statetype> <gateway>UK_PVPN_34</gateway> <direction>in</direction> <log>1</log> <quick>1</quick> <protocol>tcp/udp</protocol> <source> <address>10.2.0.1</address> </source> <destination> <address>RFC1918_Networks</address> <not>1</not> <port>53</port> </destination> <updated> <username>XXX</username> <time>1708596677.5377</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>XXX</username> <time>1708187872.924</time> <description>/firewall_rules_edit.php made changes</description> </created> </rule> <rule uuid="XXX"> <type>pass</type> <interface>lan</interface> <ipprotocol>inet</ipprotocol> <tag>NO_WAN_EGRESS</tag> <statetype>keep state</statetype> <gateway>UK_PVPN_34</gateway> <direction>in</direction> <quick>1</quick> <source> <address>UK_PVPN_34_HOSTS</address> </source> <destination> <address>RFC1918_Networks</address> <not>1</not> </destination> <updated> <username>XXX</username> <time>1708368610.472</time> <description>/firewall_rules_edit.php made changes</description> </updated> <created> <username>XXX</username> <time>1708186855.4541</time> <description>/firewall_rules_edit.php made changes</description> </created> <log>1</log> </rule>
Consider that the DNS for Proton is on a private IP 10.2.0.1. While setting up my FW rules I noticed that on this page:https://docs.opnsense.org/manual/how-tos/wireguard-selective-routing.htmlone of the rule only routes traffic with destination outside the RFC1918_Networks and that excludes access to Proton DNS so you need to change it or create one specifically for the DNS.