COMPLETE WireGuard on PFsense 2.7 Setup - Covering Windows, Mac, & Mobile + DuckDNS & Firewall 2024

  Рет қаралды 33,431

Digital Mirror

Digital Mirror

Күн бұрын

Пікірлер: 89
@thetradingclassroom
@thetradingclassroom 9 ай бұрын
We are very fortunate as viewers to have this info taught so clearly and concisely, for free! Thanks so much
@DigitalMirrorComputing
@DigitalMirrorComputing 9 ай бұрын
You are too kind mate! Thank you for the support 🙂🙂
@integrationdesigngroup7997
@integrationdesigngroup7997 2 күн бұрын
Thank you so much!!!! Massive win for our office.
@landru8582
@landru8582 11 сағат бұрын
I found your guide to be very well explained, concise and useful, thank you! Subscribed!
@veggav
@veggav 25 күн бұрын
I was getting confused configuring the android application. This was the only tutorial that explained it. Thank you, it's working now!
@TheDropForged
@TheDropForged 10 ай бұрын
I love your videos. I have been following you since your first pfsense video.
@DigitalMirrorComputing
@DigitalMirrorComputing 10 ай бұрын
Thank you so much mate and for all your support! :)
@nickydoes
@nickydoes 4 ай бұрын
Excellent video! Nice delivery, great info, and good production quality. You're on the way!
@powerarc999
@powerarc999 8 ай бұрын
Clear and working instructions. I got my WG running on the first pass of configuration. Bravo.
@DigitalMirrorComputing
@DigitalMirrorComputing 8 ай бұрын
Love it! Thanks for the support :)
@realrift01
@realrift01 4 ай бұрын
Excellent info and nicely organised. I had been struggling with wireguard for months and nearly gave up on it. This video helped me get it up and running on two devices within half an hour. Thank you sir.
@3doh
@3doh 5 ай бұрын
You're the guy. These are the kind of tutorials I like. Detailed and straight to the point. I'll keep coming to your channel. Liked and subscribed. I never activate the notifications bell but I am making an exception here. Great job!
@anilg14
@anilg14 4 ай бұрын
Followed your video and got both sides configured (pfSense and a Windows laptop). Video was easy to follow. Keep up the great work and Thanks!!!
@joshuaharding291
@joshuaharding291 2 ай бұрын
Excellent video on setting up Wireguard on pfSense. Thanks for creating this
@amansync
@amansync 10 ай бұрын
Another goldmine of a video! Absolutely loved the content, it's so engaging and informative. Keep up the fantastic work, can't wait to see more from your channel, mate! ❤
@pparisi99
@pparisi99 5 ай бұрын
Awesome video, been trying to set this up for many months. the endpoint info was missing from all other articles and videos I'd seen prior to yours.. and tailscare.. love it.
@donaldhiggs2075
@donaldhiggs2075 6 ай бұрын
Found you like a week ago and love the content. You make it easy to learn.
@OpasLinux
@OpasLinux 13 күн бұрын
Many thanks for the good instructions. I hope that in the future it will be much more user-friendly to create a VPN wiregaurd. It's really a lot of clicking here and there. Copy here and there. Thanks for your work - SUPER !
@volsfan8032
@volsfan8032 7 ай бұрын
Great Video! Straight to the point, easy to understand and not dragging the information out just for a longer video with confusing instructions like many others I saw when trying to get this to work, Your directions were spot on! Thank You very much!! I have see a few other of your videos and you just got a new sub! Keep up the good work!
@nizamersoft
@nizamersoft Ай бұрын
You did a great job, subcribed!
@KLNYC
@KLNYC 9 ай бұрын
I just started for PFsense a week ago. thx for the vid bro
@gkj7762
@gkj7762 8 ай бұрын
Thanks it worked!! I followed "L systems" tutorial last night on this and I got flabbergasted by the speed and rapid clicks, your tutorial is clean and simple to follow! 😊
@erproerpro903
@erproerpro903 23 күн бұрын
Bud, thanks so much for this info!!! That's great! Subscribed!
@xrayhead
@xrayhead 5 ай бұрын
Next-level video, so cool. Worked first time for me and super happy I now have a Wireguard VPN setup 🙂
@DigitalMirrorComputing
@DigitalMirrorComputing 5 ай бұрын
That's brilliant mate!! :) Glad I could help!
@xrayhead
@xrayhead 4 ай бұрын
@@DigitalMirrorComputing Have you tried this not using split tunnel? I can't get internet access working when connected and I'm thinking do I need a NAT rule to allow the traffic out from the Subnet I am sitting on once connected to the VPN? Currently I want to route ALL traffic over VPN so on the client I have AllowedIPs = 0.0.0.0/0
@pjba6064
@pjba6064 7 ай бұрын
this is very informative and the topic was discussed smoothly
@alnahian8435
@alnahian8435 9 ай бұрын
This is just awesome! I have been looking for this for sometime and couldn't find a good site to follow- thanks a lot for this- please make a detail video on pfsenseNG, as well as make a short video on building an enterprise environment in Azure using pfsense as FW and VMs behind it. Thanks a lot! Keep making good videos!!!
@DigitalMirrorComputing
@DigitalMirrorComputing 9 ай бұрын
thanks for the support and feedback mate! I've taken note of your suggestions which are great btw!!
@martynayshford4318
@martynayshford4318 4 ай бұрын
Perfect, I followed other tutorials and I couldn't get it to work, this one is easily the best I have come across, three android clients up and connected. (edit) I was a bit quick! It gets everything running fine for the split tunnel, but I wanted full tunnel. To get that part working I needed an outbound hybrid nat rule. What worked for me Interface = wan, address family ip4, network or alias = the wireguard /24 (mine is 10.90.10.0/24) Translation = WAN address Then it works fine.
@ronaldmatthewshergajr.3593
@ronaldmatthewshergajr.3593 2 ай бұрын
Thanks I forgot about this step. I had done it for my OpenVPN setup awhile back, and blanked on the need for this. @DigitalMirrorComputing, maybe you could add a note to the video description that full tunnel won't work unless NAT is also configured?
@chellalialhcen
@chellalialhcen Ай бұрын
Thank youuuuu 😊
@fjplfabiojunior
@fjplfabiojunior Ай бұрын
Nice, very good! thaks bro!
@shrinathmukund1991
@shrinathmukund1991 4 ай бұрын
tysm verty useful followed the guide
@ziteeup
@ziteeup 25 күн бұрын
Can you create a section describing how to connect two pfsense boxes - main office to home office ? Thanks
@eidodoos
@eidodoos 6 ай бұрын
very good tutorial. tyvm. keep it up
4 ай бұрын
new sub, fantastic video.
@kristof9497
@kristof9497 10 ай бұрын
Thanks.
@tesla2115
@tesla2115 9 ай бұрын
Thanks it worked!
@DigitalMirrorComputing
@DigitalMirrorComputing 9 ай бұрын
Sweet!!! :)
@hermilotorres1020
@hermilotorres1020 2 ай бұрын
Hi, thank you so much for this video, it is very clear and complete, i'm facing a problem, the Wireguard client on Windows connect, but in the registry, i'm getting the error message Handshake for peer 1 did not complete after 5 seconds, but the connections show as active
@ciasatellite2549
@ciasatellite2549 8 ай бұрын
Thanks, Its working on split tunnel, but NOT Working on full tunnel. I use AllowedIPs=0.0.0.0/0
@francois584
@francois584 6 ай бұрын
You need to add a NAT rule
@larrydaponte3203
@larrydaponte3203 6 ай бұрын
@@francois584 You rock! Thanks for posting this hint!
@tokoiaoben3842
@tokoiaoben3842 10 ай бұрын
Thanks I love your video. I have cgnat connection, can wireguard overcome this ?
@alaweeee1
@alaweeee1 8 ай бұрын
Awesome, here is a challenge. How about you configure WireG to operate with dynamic peers? I couldn't find any resource about that
@Ziad-Mng
@Ziad-Mng Ай бұрын
Excellent ....but why i could't connect more than one client wirequard the second one doesn't work eventhough the second one is working when you back to the first one i find it doesnt work do you have any idea about this thanks....
@Ziad-Mng
@Ziad-Mng Ай бұрын
this porblem is happend to me in pfsense and mikrotik router .
@UWcinefront
@UWcinefront Ай бұрын
What's the security difference between Netgate router running pfSense Plus with Wireguard vs cheap router and installed windows app Cloudflare Warp+ (Wireguard protocol)?
@josecorreia2584
@josecorreia2584 7 ай бұрын
Great great job! I'm being watch your videos and all of them are awesome. I used wireguard with homeassistant in the past without any issue. Since I migrate all my network to pfsense, I stoped use wireguard for a while, until today. Now I can remotly access to my networks with your help. Anyway and because my ISP refuse provide bridge service, I link the ISP modem/router through DMZ to my pfsense box. In that case the pfsense WAN interface has a private IP, but in the wireguard client configuration I setup with the Public IP. It's fine that way or should I change the endpoint IP for the WAN private IP? TKS in advance for your comments
@DigitalMirrorComputing
@DigitalMirrorComputing 7 ай бұрын
First of all thanks for watching and for the support msg! If I understood correctly, it's fine to have a private IP assigned to the WAN and to use that with wireguard. I think i the video that's what I did. If you have the option to choose, I would rather have the modem in bridge mode (cable modem only) and place pfsense between the WAN and LAN as that's the correct way to place the firewall. I also don't think you need the DMZ, you can simply disable the DHCP Server (if you have that option) in the modem, and let your pfsense box assume the role of dhcp server. You will run into double NAT, but it's more secure than going through the DMZ (if I understood correctly). Since DHCP is layer 3, if you disable the DHCP, the modem will still work at switch level and you can also use the wireless. I hope this helps mate, but happy to stand corrected if I didn't understand your question! :)
@josecorreia2584
@josecorreia2584 7 ай бұрын
@@DigitalMirrorComputing tks yr quickly reply. In general u got the real picture of my infraestructure, but some other questions arises to me. the main question it's if the endpointin of the WG setup is the public ip got from ISP modem/router or the private IP from the LAN side of ISP router which feed to my WAN pfsense box? Related of the way I bridged the out/in traffic with DMZ configuration, it was to avoid the 2xNAT, and dont delay the traffic. but perharps this is too strict and it will not have any visible effect on the private network. by security reasons If I have to live with double nat, so it will be. In the other hand, I really trust in to pfsense firewall. Sometimes the best is the enemy of the good.
@Elmojomo
@Elmojomo 7 ай бұрын
Great video, very clear! One question: So I have the server (pfsense) and client (android phone) all set up and the handshake is good. Now what? How do I access my network? I mean, this supposedly creates a tunnel to the pfsense box, but how does that translate to giving me access to the rest of my LAN from outside? This is the part that never seems to be covered in any video or tutorial that I see. Can you elaborate? For example, now I want to use my network browser app on my phone to see the shared media on my local server at home. How would I do that using this setup?
@f1aziz
@f1aziz 5 ай бұрын
14:14 Allowed IP ranges.
@bohaman.
@bohaman. Ай бұрын
My pfsense is sitting behind T-Mobile modem, I portforward 51820 from my T-Mobile modem with the lan ip address of my pfsense but I can’t get my device handshake correctly. May I ask if you have any suggestion? Thank you for your time
@xheezy
@xheezy 10 ай бұрын
was just to ask how about tailscale since its built on top of wireguard as well. RIght now I'm using taiscale and setup a rpi 4 as a tailscale exit node and router so that I can still access hosts on my LAN that can't install a VPN client software
@xheezy
@xheezy 10 ай бұрын
Competely understand the "layers" thing but for my purposes tailscale is fine and I don't have to open a port on my wan
@DigitalMirrorComputing
@DigitalMirrorComputing 10 ай бұрын
@@xheezy Oh totally mate, Tailscale is great and simplifies wireguard a lot! If it fits your purpose why change right! :)) I might do a video on it as well as there some good benefits for using it!
@KevinF923
@KevinF923 10 ай бұрын
I use Zerotier. Might test this out once I finally get my Opnsense up and runnning, but I rarely need to access anything when I'm away from home, and 99% of the time just one box. Really enjoy the videos.
@miniwing
@miniwing 27 күн бұрын
great tutorial, but if a paid vpn provider gives me a private public pair to use, the pfsense gui wont let me change the public key that it generates.
@GeorgeVayner
@GeorgeVayner Ай бұрын
With open vpn i don't need to set up every client on my network to go thru vpn or not. I guess this is a limitation of wire guard?
@sdrtyrtyrtyuty
@sdrtyrtyrtyuty 4 ай бұрын
Ughhhh, it's just not working :( I don't know what else to try.
@ValienteAguila
@ValienteAguila 6 ай бұрын
Great Video! Got my Wireguard running with it on my pfsense. But your Video lacks one important configuration step. If someone (like me) wants to redirect all internet-traffic of the mobile devices, like a phone or notebook, over the pfsense, it is not only mandatory to set allowed IP-Adresses on mobile devices configuration file to 0.0.0.0/0 but also to define in pfsense on "Firewall / NAT / Outbound" a "Mappings"-Rule for the Source IP's of the Wireguard-Net and set the "Outbound NAT Mode" to "Hybrid Outbound NAT rule generation.(Automatic Outbound NAT + rules below)".Otherwise the traffic of the mobile devces wont be forwarded to the internet and its impssube to get any internetaccess during WIreguard-connection is established.
@renatodias1804
@renatodias1804 4 ай бұрын
A very good tip! This would have saved me a lot of time if I had read your comment when I had this problem. Thank you!
@radunastase1865
@radunastase1865 4 ай бұрын
In my case i have setup the NAT outbound rule as well but still no internet... Any advices? Thank you
@renatodias1804
@renatodias1804 4 ай бұрын
@@radunastase1865 can you give more details about that outbound NAT rule please?
@ValienteAguila
@ValienteAguila 4 ай бұрын
@@radunastase1865 Did you set the "Outbound NAT Mode" to "Hybrid Outbound NAT rule generation.(Automatic Outbound NAT + rules below)"? i did not at first try and then the "Mappings"-Rule for the Source IP's of the Wireguard-Net was ignored. Also are the the Source IP's of the Wireguard-Net stet correctly?
@okanerdem
@okanerdem 5 ай бұрын
When i use wireguard on pfsense and when i do speedtest,it crash the pfsense unit. Can not possible to internet. What can be issue?
@DigitalMirrorComputing
@DigitalMirrorComputing 5 ай бұрын
check your memory and cpu with htop or top. Your filesystem might also be corrupted. I would reinstall the whole thing from fresh! Good luck mate!
@okanerdem
@okanerdem 5 ай бұрын
@@DigitalMirrorComputing Thanks for the answer. Will check:)
@appleitunes7449
@appleitunes7449 9 ай бұрын
can you help me, its not working. maybe i cant copy the pre shared key and cant type it in the wireguard note in windows. all in all i followed your tuts
@stanley_cz217
@stanley_cz217 8 ай бұрын
Copy key buttons only work in HTTPS mode
@visghost
@visghost 4 ай бұрын
I don't have a Pre-shared Key copied, I don't want to feast on Pfsense 2.7.2
@amoryblaine1102
@amoryblaine1102 10 ай бұрын
how do u intstall pfSense in MacBook Sonoma?
@DigitalMirrorComputing
@DigitalMirrorComputing 10 ай бұрын
Does the macbook has 2 nic? If it only has one, you "can't" do it!
@geoffpedder
@geoffpedder 4 ай бұрын
Seems like a lot of config compared to using tailscale
@HendrikHanf
@HendrikHanf 7 ай бұрын
On my system 2.7.2 this is not working. Tunnel is up, no route to private network under Windows 11. Wireguard is boring on installation. OpenVPN on pfsense is plug & play.
@TheKisem
@TheKisem 4 ай бұрын
OVPN Client softwares are trash tbh, and OpenVPN is much slower than WG. Not to mention that with a more user friendly interface you can set up a working VPN a lot faster with Wireguard. pfSense should up their UX game, because this slow bootstrap themed UI is a mess.
@Damia-cz8og
@Damia-cz8og 9 ай бұрын
how guide VPN Wireguard and connect close ip public yes final network ip see VPN yes router "PFSENSE"
@RandomizerVidz
@RandomizerVidz 10 ай бұрын
Nice video tutorial! Personally I hate wireguard. Speeds are great however the fact you need to generate keys for every client/device sucks. Openvpn is great to set and forget at the router. You shouldn't have to go through all this trouble for every device connected to your router it defeats the purpose of having a VPN router
@DigitalMirrorComputing
@DigitalMirrorComputing 10 ай бұрын
That's a very fair point! It can be a pain in the ass to grant and revoke keys all the bloody time! Also I believe you can integrate OpenVPN with ADFS and manage authentication that way! For my home lab (and given I am the only user as the missus is alergic to computers) is good enough! :D Thanks for watching! :)
@nokarukuta587
@nokarukuta587 8 ай бұрын
Tailscale is a thing, but the initial authantication goes through them so technically not as secure
@RangerBru
@RangerBru Ай бұрын
Would it be possible to go over the process of configuring OpenVPN and ADFS for authentication?
@donnied8127
@donnied8127 8 ай бұрын
One question, if you have local domains on let's say office network like laptop01.local, Wireguard cannot resolve those, and you could need your laptop01 actual IP address...any idea how to work around that?
Build a Secure Site-to-Site VPN with Pfsense & WireGuard
22:39
Lawrence Systems
Рет қаралды 14 М.
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 120 МЛН
Why I am Not Using OPNSense
8:26
Lawrence Systems
Рет қаралды 130 М.
Why you need to setup a Meshtastic node.
11:12
Signal Sphere Foundation
Рет қаралды 7 М.
You're running Pi-Hole wrong! Setting up your own Recursive DNS Server!
18:02
Build your OWN WireGuard VPN! Here's how
12:21
Jeff Geerling
Рет қаралды 403 М.
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН