[Interface]Address = 10.0.0.4/32PrivateKey = {privatekey}[Peer]PublicKey = {publickey}#AllowedIPs = <Networks to which this client should have access>/<Netmask># // For example "10.11.0.0/24, 192.168.1.0/24"# // | |# // +--> The network area of the OPNsense WireGuard VPNs# // |# // +--> Network behind the firewallAllowedIPs = 0.0.0.0/0#Endpoint = <Public IP of the OPNsense firewall>:<WireGuard Port>Endpoint = mydomain:51820
Add to allowedIPs on peer:10.0.0.x/32 (i.e. IP of opnsense in tunnel), 192.168.a.b./24 (i.e. LAN(s) of the the opnsense)
Quote from: chemlud on June 27, 2024, 06:01:13 pmAdd to allowedIPs on peer:10.0.0.x/32 (i.e. IP of opnsense in tunnel), 192.168.a.b./24 (i.e. LAN(s) of the the opnsense)He's already got 0.0.0.0/0 in there - no need to add more specifics for a road warrior.
How are you trying to "reach the LAN"? Ping? You have TCP/UDP in that rule for the WG interface - so ICMP will be blocked. - ping from your client- do packets come out of the wg0 interface on OPNsense (tcpdump)?- if the don't, do packets arrive on port 51820 on WAN (tcpdump)?- if they don't, your client might be behind some firewall blocking the connection - BTW, you cannot test from inside the same OPNsense, hope that was obvious- if packets do come in on WAN/51820 are reply packets leaving WAN towards your client?- if they don't, the OPNsense side does not have a valid connection - are you allowing UDP/51820 in on WAN?- etc. let's start with the basics
For Windows see post #7 regarding default routing...