Will this be the permanent implementation for WireGuard in pfSense or will it eventually be in the VPN tab in the GUI?
@rollinthedice73553 жыл бұрын
I was wondering, other than having one IPv4 and IPv6 tunnel address what would be the use case for having more than one IPv4 or IPv6 tunnel address? If you were using Network Address Translation for a tunnel with two IPv4/IPv6 addresses what address would be used as the the interface address for translation? Would that have to be specified in the NAT rule?
@rollinthedice73553 жыл бұрын
I had some time to watch your previous videos, I see now that you add the interface IP addresses manually so I understand the configuration process now.
@TheDRMSKR3 жыл бұрын
How do you specify which WAN with multi WAN that WireGuard will use?
@ChristianMcDonald3 жыл бұрын
The only two ways are 1) create a static route to force traffic to a remote endpoint out a specific WAN. So if your remote peer was a 1.2.3.4, and you wanted this to always go out WAN2, you'd create a static route of 1.2.3.4/32 on WAN2. Static routes don't support gateway groups. 2) Set a gateway group as your pfSense default v4 and/or v6 gateway to allow WireGuard to failover between links, and policy route any lans that you want up only ride over a particular gateway
@TheDRMSKR3 жыл бұрын
@@ChristianMcDonald Um.. Ok. So WireGuard only uses the Default Gateway or Gateway Group? Can WireGuard be used as a Gateway Group utilizing more than one WAN, or as a MultiLink Tunnel? Currently I am directing an Alias group through an OpenVPN on WAN2. This traffic I only want on WAN2. The rest of the traffic I want Ballanced between WAN1&2, of which I have a Gateway Group set as default, and general trafic set to go through that group. I've been trying to force all things KZbin to go through another OpenVPN tun, without success... Can I Set a WireGuard link for Each WAN, and set those up as a Gateway Group? Or other multilink option? Sorry, it gets a little confusing for me, not being able to specify an interface..