Basic Site-to-Site VPN Using WireGuard and pfSense

  Рет қаралды 69,567

Christian McDonald

Christian McDonald

Күн бұрын

Пікірлер: 129
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Timestamps: 0:00 Introduction 1:10 Site-to-Site Routing 101 12:54 WireGuard Configurations 17:25 WireGuard Allowed IPs 22:15 Interface Assignments 24:53 Upstream Gateways and NAT Implications 27:15 Gateways and Static Routes 30:12 Firewall Rules 35:15 Demonstration 43:46 Wrapping things up Links: Upcoming Release Notes : docs.netgate.com/pfsense/en/latest/releases/22-01_2-6-0.html WireGuard Documentation : docs.netgate.com/pfsense/en/latest/vpn/wireguard/index.html Discussions: Facebook : facebook.com/groups/pfsense.official/ Reddit : reddit.com/r/PFSENSE and reddit.com/r/netgate Forum : forum.netgate.com/
@speedup070605
@speedup070605 2 жыл бұрын
Thank you for doing this breakdown of wireguard site to site. Watching your video teach me a lot about wireguard
@LAWRENCESYSTEMS
@LAWRENCESYSTEMS 2 жыл бұрын
Great video!
@Simon-ps9mx
@Simon-ps9mx 2 жыл бұрын
Surely one of the best networking video tutorials I've watched in a long time. Thank you very much for explaining this so clearly and thoroughly. Including an overview diagram and taking the time to explain not just what to enter on which screen, but WHY, is so often missed in other tutorials. You've clearly thought this through and will help many people with this. Awesome work. Worth watching the full video.
@thomashong7
@thomashong7 2 ай бұрын
Absolutely the best video on wireguard and pfsense! I have re-watched it several times because your teaching of routing, interface, firewall rules, wireguard config, and how it all relates is explained so clearly and thorough. Thank you!
@eidodoos
@eidodoos Жыл бұрын
"basic" *me crying in the corner [edit] *frankly speaking, your explaination is amazing. very detail. you surely know how thing works. thanks for sharing. i will watch 100 times more
@alishersadykov861
@alishersadykov861 2 жыл бұрын
Everything is perfect about this video -diagramm, concept and speech. Good product and talented people!
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Thanks!
@ronaldvargo4113
@ronaldvargo4113 Ай бұрын
This has provided a great getting started with dealing with CGNAT with 5G and StarLink ISP's. Setting up a cloud hosts VPS and then creating a site-to-site VPN with Wireguard to bring traffic into my network for hosted services is my goal.
@ko_3x335
@ko_3x335 10 ай бұрын
Thanks for this Video. It helped a lot to unverstand the basics of wireguard and to finish my project.
@gorgonbert
@gorgonbert 2 жыл бұрын
Thank you very much 🙏 I noticed that i had misunderstood a few things about how site to site works and you cleared that up.
@Hossimo
@Hossimo 2 жыл бұрын
Thanks for this and very timely just switched out an old USG at my home for a SG 2100 and was switching from an IPsec to WireGuard. Absolutely perfect timing and awesome information!
@Hossimo
@Hossimo 2 жыл бұрын
So very close. I have the tunnel fully working (I can access both ends) but for some reason the Gateway says 100% loss and down, though I'm actually running through it. Logs say something to the effect of "dpinger TUNNEL 10.222.222.0: sendto error: 93", obviously it cannot ping the gateway, even with wide open rules.
@MohammedRadwan-j9u
@MohammedRadwan-j9u Жыл бұрын
I have the same issue here and im not sure what went wrong :/ @@Hossimo
@MT-yo3mg
@MT-yo3mg 2 жыл бұрын
Awesome video. Great to see the explanation on the basic principles, I can imagine this will help ALOT of people. Keep up the great work!
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Glad it was helpful!
@zacharyfoster7784
@zacharyfoster7784 2 жыл бұрын
This was the best video I have come across. I was setting up my tunnel the other day using just the documentation and various other sites and you explained it in such a way that I could easily set up all of this again without any of that. Keep it up man!
@mohsinhassan88
@mohsinhassan88 2 жыл бұрын
Such a good video very very very clearly explain and in simple term.. Good job, very few people are able to explain in such simplicity
@K4YG58hi
@K4YG58hi 2 жыл бұрын
I was banging my head against a wall trying to make a site-to-site cloud vps and this video saved me, great explanation and excellent breakdown of pitfalls and what would happen if reconfigured. great video!!!
@briane9729
@briane9729 9 ай бұрын
Fantastic Guide! and with well delivered insights into the workings of pfsense and the pitfalls one could encounter. Thank you for all your hard work creating the wireguard package and this great video!
@sebeqone
@sebeqone Жыл бұрын
Long time pfsense user, finally decided to check wireguard and thanks to You and this extraordinary tutorial everything is clear.
@aarona9332
@aarona9332 2 жыл бұрын
Great, great video. A huge amount of information presented clearly and concisely. This should be a template for all tech tutorials. Learned a lot about wireguard here. Thank you!
@smiletoday8508
@smiletoday8508 2 жыл бұрын
I was able to get my site to site working because of your video. I also have a deeper understanding of network traffic.
@mithubopensourcelab482
@mithubopensourcelab482 2 жыл бұрын
Excellent Video !!! Simple and lucid language. Proper explanation of everything. Kudos. The problem is I can click LIKE button once only.
@cheooo07
@cheooo07 5 ай бұрын
Great video. Thank you. A tip would be that when working with internet dynamic IP we can use a dynamic DNS for endpoint IP, that way if our public IP changes we should be good establishing the tunnel. I've been using Duck DNS and so far so good.
@ersterhernd
@ersterhernd Жыл бұрын
This was a terrific tutorial. I now can use both public IP's from my provider tunneled securely together with PFSense and WireGuard. Thanks very much!
@hawks5196
@hawks5196 2 жыл бұрын
Amazing video, so so so clear and very well explained. Always struggled with WireGuard and site to site VPN's, but this covers the basics and then some. The extra tips and little explanations are super helpful to prevent getting tripped up! Thanks so much, Christian.
@mattwhite532
@mattwhite532 2 жыл бұрын
Thank you so much Christian for the hard work and time you've put into these videos. They've helped me to solve issues that have plagued me for a couple years now. I sincerely appreciate it! I look forward to your upcoming videos, especially the one you teased about the use of FRR and BGP for use with dynamic routing. I've been curious about its use and if it's something that could help streamline things for me.
@Paulctan
@Paulctan Жыл бұрын
Thank you for an excellent video! Really good explanations, and with your video, I got my site to site WireGuard working!!
@oldanalog_synth9244
@oldanalog_synth9244 2 жыл бұрын
Thank you and i wish you a merry Christmas.
@devanbhagat7718
@devanbhagat7718 2 жыл бұрын
Great video! It would be nice if you could add a chapter describing how to do this with policy based routing. Thanks.
@satdevlpr
@satdevlpr 2 жыл бұрын
One of the best Video about pfSense with WireGuard..
@Nar1117
@Nar1117 2 жыл бұрын
Wow man, this is a really well-done tutorial and explanation. Pretty impressive that you can go through that so seamlessly! Thanks!
@dbadovsky
@dbadovsky 2 жыл бұрын
Thanks a lot! Very needful information in such an easy expanation!
@arghyl
@arghyl Жыл бұрын
This is a great video! I was able to follow and wrap my brain around some concepts I didn't get. Thank you!
@FRANKLEO123
@FRANKLEO123 2 жыл бұрын
Thank you Chris for this. I’ll be trying this after Christmas
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Definitely circle back and let me know how it goes!
@FRANKLEO123
@FRANKLEO123 2 жыл бұрын
@@ChristianMcDonald i tried to set this up yesterday. it seemed like it worked but no traffic will pass. everything looks exactly like you have it setup. i get the handshake, but cant goto site 2 lan for some reason. firewall rules look right.
@FRANKLEO123
@FRANKLEO123 2 жыл бұрын
@@ChristianMcDonald ok i got it. problem was a stupid mistake with the firewall rules on remote side
@ks313-g8o
@ks313-g8o 8 ай бұрын
nice.. helped a lot to get my head around this topic!
@darkenaxe
@darkenaxe 9 ай бұрын
You are a very good teacher ! Thank you for this.
@dogbreath7777
@dogbreath7777 Жыл бұрын
Excellent video.....finally somebody who explains tunnel routing.....gets a like subscribe bell and a share !!!
@21Lettere
@21Lettere Жыл бұрын
An IPv6 tutorial would be great, maybe with a method to avoid IPv6 traffic leak to the WAN interface instead of going into the VPN tunnel.
@wawesh254
@wawesh254 Жыл бұрын
Amazing video. Keep up the great work!
@IamKhoramdin
@IamKhoramdin 2 жыл бұрын
Thank you Chris. this is amazing
@cloudbase7799
@cloudbase7799 2 жыл бұрын
0:27 Irregardless is a fairly common colloquialism _regardless_ of your opinion. 🙉😉
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Haha, my wife reminded me of the same thing!
@cloudbase7799
@cloudbase7799 2 жыл бұрын
@@ChristianMcDonald I wasn't expecting a response from you over my trivial comment, but thank you! Thanks for the excellent/clear/accurate content. Subscribed.
@markusschmid4257
@markusschmid4257 12 күн бұрын
Thanks man, perfectly explained!!
@HeineChristensen
@HeineChristensen 2 жыл бұрын
This demo/guide is no less than awesome!!! 👍
@sashalexander7750
@sashalexander7750 Жыл бұрын
I would love to see a video with a more complex setup, i.e. failover with two providers while at the same time having site-to-site wireguard vpn and road warrior vpn. May be even hub and spoke wireguard VPN setup with failover to two different ISPs.
@ktube98
@ktube98 2 жыл бұрын
Super well done, Christian, thanks! Can you recommend or would you consider another video that covers the roaming laptop endpoint use case?
@xanderthunder69
@xanderthunder69 2 жыл бұрын
Thank you sooo much for this amazing tutorial! You are awesome!
@donraymond8933
@donraymond8933 2 жыл бұрын
Thanks Christian - great video and work on Wireguard - much appreciated. You have mentioned it in the past and touched on it in this video, but I was wondering why the Allowed IPs do not become static routes so we wouldn’t have to create an interface, do static routes etc, unless we had more advanced needs (firewall rules, nat). Would it be possible in pfSense (a static route is created for the tunnel network without creating an interface)? Presumably all traffic for an Allowed IP should be routed there anyway. Just wondering what you're thinking is on this topic.
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
The most obvious reason is when you’re using dynamic routing with FRR. In that case you need to define allowed IPs but the routes are managed by FRR. It might be possible to add some additional config options to automatically create static routes if necessary. Once we ship 22.01/2.6 here soon, I will be revisiting a list of todos to work on. I will consider this and see if the usability can be improved
@donraymond8933
@donraymond8933 2 жыл бұрын
@@ChristianMcDonald Got it. Thanks for the quick reply. How about a little check box ;-)
@allaboutcomputernetworks
@allaboutcomputernetworks 8 ай бұрын
Excellent video.....👍
@RobertoRubio-ij3ms
@RobertoRubio-ij3ms Ай бұрын
Awesome video mate. Thanks heaps.
@jonnyotter1852
@jonnyotter1852 2 жыл бұрын
This video was very helpful and helped me debug a site-to-site VPN I needed. One problem I still have is that the two sites I have connected have an overlapping subnet. I would like to NAT the overlapping subnet at my main site so that all of the devices are accessible to the remote site. I know how to do this with IPsec with NAT/BINAT settings. How is this accomplished when using a WireGuard tunnel?
@MrXuegui
@MrXuegui Жыл бұрын
Thank you for this detailed, informative video. I hope it will help me with keeping my mom's internet/network working (retired in sunnier places). Unfortunately, their ISP assigns private IP addresses, so unable to use dynamic DNS and all that to establish remote connections. I am hopeful the pfSense device I am sending to them will initiate that S2S link and allow me to get through their ISPs NAT. I have a DDNS so I am using that for their side to establish the link. Interesting because so many other services can break through ISP NAT (Never had problem with Google Remote Desktop). Kind of wish there was a package/server just for that in pfSense. Initial setup looks good from their device (the WAN of their device is hooked into my LAN). My box though won't show their Gateway as reachable. My guess is my pfSense is sending it out through its WAN (and not back through the LAN, maybe I should try NAT reflection lol) and should not be an issue once my mom's device is connected to the internet and not to my LAN. I don't really want to mess up my network to validate that it will work. Worst case if it doesn't, I look at other means of helping them when the time comes.
@QuantumDrift-u5k
@QuantumDrift-u5k 2 жыл бұрын
Nice work as always! Really useful guide
@garyturner8250
@garyturner8250 2 жыл бұрын
Great video, thanks for the effort you put into this.
@enekoanorgairigoyen7874
@enekoanorgairigoyen7874 2 жыл бұрын
As usual a great video Christian, thank you. But I am trying to do something else. Connecting from LAN from Site1 to LAN from Site2 is working for me, but how could I allow users connecting to Site1 via WireGuard (they get a different IP from different range) also allow connecting to LAN from Site2? I thought that by allowing it at the Firewall Rules "WireGuard" would be enough but eventhough I see traffic going out from the S2S interface I don't see a return traffic (when pinging). If you have some ideas please let me know and Thank you and regards!
@ktube98
@ktube98 2 жыл бұрын
Thanks! Have a beer with this thank you!
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
🍻 cheers!
@AngryBeardGG
@AngryBeardGG 2 жыл бұрын
Really good video man, I learned a lot here. Thanks!
@networkfreddy2000
@networkfreddy2000 2 жыл бұрын
Great video Christian, thanks!
@kbtang88
@kbtang88 Жыл бұрын
I want to know if you have video for wireguard site a multi-site and how to set it up. It will be lovely to have video for that.
@TechLabUnleashed
@TechLabUnleashed Жыл бұрын
whats software do you use for your diagrams?
@boomtown7190
@boomtown7190 Ай бұрын
Helped me out, Thank you
@richardfearing4751
@richardfearing4751 2 жыл бұрын
Very helpful video.
@MegaVorian
@MegaVorian 4 ай бұрын
That's great! But what if I need to access both networks from outside using a WireGuard client? How should I approach this solution?
@tsaopaulo
@tsaopaulo Жыл бұрын
Hi Christian, Great video, I was able setup the site to site VPN and I created a seperate remote access tunnel and both works. But when I connect using remote access I cannot access the remote site subnet throught site to site VPN tunnel? Do I need to make a interface for the remote access and setup gateway? or create a NAT? It would be great if you can create a video on this. thanks.
@chrisjchalifoux
@chrisjchalifoux 2 жыл бұрын
Chris It Helped me out alot
@andersostlund
@andersostlund 11 ай бұрын
Excellent!
@systemofapwne
@systemofapwne 10 ай бұрын
Wait a minute: Aren't you supposed to add "Site 2"-IPs to the "Site 1 AllowedIPs" in order to make sure, that "When calling an IP in the range of Site2 on Site 1, it goes through the tunnel"? At around 19:00, you add "Site 1 IPs" to the "Allowed IPs" of "Site 1". Nevermind: I skipped over your explanation that "white theme = Site 1 & dark theme = Site 2". You did all correct and I was just confused/skipped too much.
@benpridmore3610
@benpridmore3610 2 жыл бұрын
Thanks for the video, it's been very helpful! One question. I want to a site to multisite config (which is working). Is it possible for remote sites to access each other through their one connection to the main site?
@raycheung1653
@raycheung1653 2 жыл бұрын
Awesome video.
@nodd85
@nodd85 11 ай бұрын
Awesome video. I used this setup for a Wiregaurd VPN connection from my phone to my home, and my mobile laptop to my home. When I connect to my home via the wireguard vpn from my laptop, on the interface statistics widget I get around 20-40 "errors out" per minute. I don't get the same result when connecting via wireguard vpn from my phone, that doesn't give me any "errors out" on the interface statistics widget on the dashboard. The connection works from my laptop, but I'm not sure why I'm getting these errors. Running the VPN for about a half hour gives me 1000 "errors out." Any idea where I can start to try and fix this?
@fhgnius
@fhgnius 2 жыл бұрын
Amazing video. Thank you very much for your hard work! I would appreciate if yourself or someone else in the comments could answer - can I make ALL internet traffic flow from site 2 via site 1 (so that all traffic appears to an outside server to come from site 1). Thanks in advance.
@RevolverRoss
@RevolverRoss 2 жыл бұрын
Thank you for this amazing video, I ran into an interesting issue where I could connect to Site 2 using transit 10.100.x.x but couldn't connect using Site 2s LAN 10.69.x.x. I am using 2 eth ports, one goes to pfsense LAN, one goes to home LAN. I wanted to know if I maybe need to add a route to my windows 10 routing table so that I can reach Site 2s LAN while both ports are active.
@andresdaza3557
@andresdaza3557 2 жыл бұрын
good content, i mean really good, but why the datatransfer between 2 VIRTUAL pfsenses (site2site) following your description step by step, is even slower than ipsec. i was looking for any answer , why the datatransfer latency do not pass over 7 or 8 mb/s? both HQ internet speed over 600 mb/s (fiber) . Is it for to be virtual devices? or what deppend that? thanks again
@gmas
@gmas Жыл бұрын
Thanks!
@Angelo-ew9cs
@Angelo-ew9cs 15 күн бұрын
I followed along and had all the traffic go through that connection. Is it possible to create an alias so I can state which devices go through and which ones don't?
@softwareengineer9435
@softwareengineer9435 2 жыл бұрын
Thank you
@Hi5ist
@Hi5ist 9 ай бұрын
Great video! Still having something wrong... If I test with ping in the pfsense diagnostic tool it works perfect, but it doesn't work if i do ping from y pc, I do research with no success, do yo have some clue?
@rv112xy
@rv112xy 2 жыл бұрын
Can you do a video how to fix the issue that if running a multi WAN setup as failover and WAN1 goes down, Wireguard is connecting via WAN2. But if WAN1 comes up again Wireguard is never switching back to WAN1 and stays at WAN2.
@nandurx
@nandurx Жыл бұрын
Hye, Thanks for video. I see handshack between two sites, but I can't ping from my pc to camera on other side.
@bardspaun
@bardspaun Жыл бұрын
I have successfully set up the wireguard s2s tunnel and entered "none" in the field for upstream gateway on both sides, yet the tunnel ip address displays when i connect to the remote site which indicates there is NAT though the tunnel. What could cause this? What NAT rules should i look for and erase?
@dannythomas7902
@dannythomas7902 2 жыл бұрын
Hey mate, I took a break from it as I had massive problems after 1 month on it
@mithubopensourcelab482
@mithubopensourcelab482 2 жыл бұрын
Will this type of networking with Wireguard, ends MPLS market ???? I am just curious !!
@PedroMorenoBOS
@PedroMorenoBOS 2 жыл бұрын
I had seen u always touch the mtu or mss, is rule for WG or is just for your specific for your network? thanks for the video.
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Not unique to my network. The reason behind this is if you’re passing 1500 byte packets inside the tunnel, once the WireGuard header is attached, it will put that packet over 1500 bytes, which will likely result in fragmentation once it leaves your outer layer for transport to the remote peer. By clamping you ensure that no fragmentation will occur.
@PedroMorenoBOS
@PedroMorenoBOS 2 жыл бұрын
@@ChristianMcDonald thanks happy holidays.
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Likewise sir!
@hjaltioj
@hjaltioj 2 жыл бұрын
Hi Thanks for great video :) Is it possible to route the internet traffic from Site 2 to go out WAN on Site 1 ? Thank you :)
@psinetworks
@psinetworks 2 жыл бұрын
Awesome video, I have a multi site setup. It was working fine before switching to the package based version of Wireguard. Right now I cannot get traffic to pass from one remote site through the central site to another remote site. Any ideas as I have tried almost every combination of options.
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
So let's assume we have Site A, B, and C. Site A and Site C connect to Site B. If Site A wants to speak to Site C, it has to go through Site B. Site B has one tunnel with two peers: Site A and Site C. The trick is you still require a permissive firewall rule at Site B. It's a bit confusing, but packets coming from Site A to Site B are going to be evaluated by pf even though the packets are going to enter and leave via the same virtual interface (tun_wgX interface). This is most likely a firewall issue.
@psinetworks
@psinetworks 2 жыл бұрын
​@@ChristianMcDonaldOK but I have an allow all rule for both the WireGuard and the WG0 interfaces. From Site B I can ping any host at Site A or C. Does it not have anything to do with the allowed IP's?
@psinetworks
@psinetworks 2 жыл бұрын
So eventually got it to work with some additional static routes and allowed IP's at each location. All good now thanks!
@rajilsaraswat9763
@rajilsaraswat9763 2 жыл бұрын
Thanks a lot for this video. I am using FRR/BGP for site-site VPN. The pfsense routing table is correctly being populated by FRR. However, i dont know how to get FRR to populate routes in the crypto routing table (at the moment i am populating manually the allowed ips hence defeating the purpose of FRR). Any hints?
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
Simply allow all ipv4 (0.0.0.0/0) and all ipv6 (::/0).
@olexandrmikhailov1500
@olexandrmikhailov1500 2 жыл бұрын
Hey Christian. I have a question. I did setup the wireguard tunnel between two pfsense sites. I further would like to have a client on remote pfsense connect through the tunnel to main pfsense and use main pfsense wan. how do I need to route this? best regards
@urzu181
@urzu181 2 жыл бұрын
Ok so I have three sites all behind NAT and routing through a cloud VPS. Everything works fine except for if I need to Halt or Reboot the firewall, the WireGuard gateway gets disabled automatically for some reason and upon next login have to manually enable it. Weird thing is that the WireGuard service doesn't start until the gateway is enabled even having it added to ServiceWatchdog. Any ideas?
@alexsinbb
@alexsinbb 2 жыл бұрын
Any reason why "only unassigned tunnels" seems to do nothing? My sole VPN tunnel is an assigned interface but it's still being managed by the "Wireguard" firewall rules...
@alexsinbb
@alexsinbb 2 жыл бұрын
I fixed it by setting back to all tunnels and then back to only unassigned tunnels... a little buggy but now works!
@scoreseb
@scoreseb 2 жыл бұрын
Hi I have a question I try to connect a client with wireguard vpn, I create a link between site A and site B by creating a tunnel beetween A & B it seem to communicate Each other i would like to connect the client into the site A with vpn and active directory to join the site B. I create a new peer on the same tunnel when I connect the hand is red and the customer no longer has any connection would you have some idea
@skorpion1298
@skorpion1298 2 жыл бұрын
Question: for example on one of my pfsense I have a router on WAN that is 192.168.1.1 and on LAN I also have 192.168.1.1. Would this be a problem?
@markvos2565
@markvos2565 2 жыл бұрын
Is it possible to set this up with just a WAN interface only behind another firewall. Basically using pfsense as a wireguard appliance? I have it successfully working from PC's / iPhones to pfsense, but this site to site tutorial I have been unsuccessful in getting it working. Port forwarding is enabled on the UDM Pro on both networks, everything is setup correctly, but it seems to want a LAN and WAN interface.
@garyturner8250
@garyturner8250 2 жыл бұрын
This can be achieved. If you deploy pfSense with a single interface the WAN also becomes the LAN and in this mode you effectively use pfSense as a VPN termination point.
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Roinding tyblu files writing work?
@aborsik
@aborsik 2 жыл бұрын
I my setup (up-to-date OPNSense os-wireguard 1.9 and up-to-date Windows Wireguard 0.5.3 peer) everything works well but I have strange short timeout (like no connection) for about 15 seconds each time very closely to handshake which is every ~ 2 minutes. Each time after handshake connection resumes. Is there any setting that I can try to edit to resolve this problem? I set keepalive to 15s but it seems that it has no effect.
@kbtang88
@kbtang88 2 жыл бұрын
How do you route to vlan with site to site?
@mohamedmalwa1607
@mohamedmalwa1607 2 жыл бұрын
thanks , kindly what is the name of the app for network design
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
www.diagrams.net/
@godelrt
@godelrt 2 жыл бұрын
If I assign WireGuard to an interface, do I now need to add firewall rules in this interface to allow traffic?
@ipstacks11
@ipstacks11 2 жыл бұрын
Starting at around 30:25 in the video, the answer is yes, you do. Also be aware of the wireguard group that can also have rules that are processed before the interface level rules. This is based on a scenario of static routing. You said " If I assign WireGuard to an interface " I take that to mean, if I assign a wireguard interface to a pfsense interface . . .
@phiwatec2576
@phiwatec2576 2 жыл бұрын
Please do the same video with IPv6 😊
@sgtlionelfrey
@sgtlionelfrey 2 жыл бұрын
I’m currently using the wireguard network in /32 for both allowed ip and interfaces in other to connect 5 sites all together. For 2 sites vpn you can also use /32 but is there any reason for using /31 instead?
@JuanManuelMedinaPalominos
@JuanManuelMedinaPalominos 2 жыл бұрын
/31 is used for point to point networks and there is not broadcast or network address it is used to make the best use of ip space when only 2 hosts are needed.
@asa88asa88
@asa88asa88 2 жыл бұрын
Hi. Thank you for the video. I have question, I have vps with subnet/24, the subnet all is publics IPs. I want to use thos publics ips on my infrastructure home like asign them to my servers. What the best solution to make it possibel to use all thos ny publics ip on my vps to my servers. Thank you.
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
If your VPS is running pfSense too you could run WireGuard between the VPS site and home and use FRR with OSPF to route your /24 subnet to your home.
@asa88asa88
@asa88asa88 2 жыл бұрын
@@ChristianMcDonald thank you for fast answer. Wish you a wonderful day.
@gogomumin64
@gogomumin64 2 жыл бұрын
26:45 copacetic
@TheK0tYaRa
@TheK0tYaRa 2 ай бұрын
God dammit man i always forget AllowedIPs
@mithubopensourcelab482
@mithubopensourcelab482 2 жыл бұрын
pfSense is far far better than Sophos and other commercial firewalls except voip traffic.
@ChristianMcDonald
@ChristianMcDonald 2 жыл бұрын
What issues have you had with voip/sip?
@KAEvans91
@KAEvans91 2 жыл бұрын
@@ChristianMcDonald IIRC it's generally that WireGuard doesn't (and probably will not) carry DSCP from the underlying packet header.
@thegorn
@thegorn 2 жыл бұрын
OVPN is better than WG because the former can use QoS within the tunnel and also can be pinned to a particular WAN interface. WG is lame and for VPN babies / noobs.
A Tailscale Package for pfSense!
30:18
Christian McDonald
Рет қаралды 42 М.
pfSense Software + WireGuard Package - Project Report 012
39:31
Christian McDonald
Рет қаралды 8 М.
1, 2, 3, 4, 5, 6, 7, 8, 9 🙈⚽️
00:46
Celine Dept
Рет қаралды 108 МЛН
This Game Is Wild...
00:19
MrBeast
Рет қаралды 130 МЛН
Hoodie gets wicked makeover! 😲
00:47
Justin Flom
Рет қаралды 131 МЛН
pfSense Configuration Guide - Zero to Hero!
1:26:20
Jim's Garage
Рет қаралды 15 М.
Why I no longer use a VPN (most of the time) and nor should you
11:25
Sun Knudsen
Рет қаралды 1,3 МЛН
Using WireGuard for Site-to-Site VPN
14:11
LinuxCloudHacks
Рет қаралды 20 М.
pfSense WireGuard Guide Series 001 - Mullvad Failover
28:33
Christian McDonald
Рет қаралды 25 М.
Layer 2 vs Layer 3 Switches
6:02
PowerCert Animated Videos
Рет қаралды 821 М.
ALL ABOUT VPNs in OPNsense! Wireguard, OpenVPN, and IPSec Setup and Configuration
1:04:14
(RouterOS 7) Wireguard Site to Site VPN on Mikrotik Router
9:40
Wire Network
Рет қаралды 3,5 М.
My pfSense Setup - VLANs, VPN, Firewall, DHCP
31:49
Raid Owl
Рет қаралды 95 М.
How to Setup The Tailscale VPN and Routing on pfsense
17:10
Lawrence Systems
Рет қаралды 89 М.
pfSense Wireguard Site-to-Site VPN Setup (3-Way) Tutorial
46:57
Sheridan Computers
Рет қаралды 12 М.
1, 2, 3, 4, 5, 6, 7, 8, 9 🙈⚽️
00:46
Celine Dept
Рет қаралды 108 МЛН