• PfSense DNS via WireGuard - slow loading time for some web pages

    12
    0 Votes
    12 Posts
    2k Views
    N
    Off course, thanks for reporting.
  • Wireguard pfsense proton - No access dur to DNS Problem

    1
    1
    0 Votes
    1 Posts
    52 Views
    No one has replied
  • wireguard policy routing broken after 25.07

    15
    0 Votes
    15 Posts
    886 Views
    4
    ping the pings don't seem to return and curl returns I have tried changing mtu/mss down to 1200 and various in between. I don't believe it is an mtu/mss issue. like I said, this has only started since 25.7 curl -4 -v --interface tun_wg0 -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36" https://ifconfig.me * Host ifconfig.me:443 was resolved. * IPv6: (none) * IPv4: 34.160.111.145 * Trying 34.160.111.145:443... * Local Interface tun_wg0 is ip 10.2.0.2 using address family 2 * Name '10.2.0.2' family 2 resolved to '10.2.0.2' family 2 * Local port: 0 * ALPN: curl offers h2,http/1.1 * TLSv1.3 (OUT), TLS handshake, Client hello (1): * CAfile: none * CApath: /etc/ssl/certs/ * TLSv1.3 (OUT), TLS alert, decode error (562): * TLS connect error: error:0A000126:SSL routines::unexpected eof while reading * closing connection #0 curl: (35) TLS connect error: error:0A000126:SSL routines::unexpected eof while reading
  • WireGuard QR code peer configuration export

    1
    0 Votes
    1 Posts
    76 Views
    No one has replied
  • 1 Votes
    6 Posts
    599 Views
    J
    @cmcdonald still planning to merge this?
  • Cannot connect to LAN devices from Wireguard VPN

    7
    9
    0 Votes
    7 Posts
    7k Views
    M
    @Jarhead I know this is ~3.5 years late, but your reply literally saved my life. After working on this for about 5 hours with crappy documentation and even crappier YouTube tutorials, I was about to pass away for personal reasons. The damn ACL I didn't even know existed was the problem, proving once again that it's always DNS, even when it's not.
  • 0 Votes
    6 Posts
    225 Views
    Z
    I'm using AirVPN and I've been around the block on this. Either all my networks (LAN and 3 VLANs) go through AirVPN or my ISP, but I haven't gotten the split to work with Wireguard. I think I'm screwing up something with the gateway routing or the hybrid (or manual) NAT. If anyone knows of a working demonstration of a VLAN only VPN wireguard setup please let me know. The goal is one with the ISP and one with the VPN. I would think this is the most basic use of a VPN and VLANs. I'm missing a step somewhere or doing a step wrong.
  • cannot send traffic that require TCP (https) via the tunnel

    3
    0 Votes
    3 Posts
    131 Views
    C
    Not certain I understand, are you saying to create a rule in the WireGuard rule tab or in the VPN rule tab or both? the rule would look like? Action: Pass Interface: Wireguard ? or VPN? Protocol : TCP Source: Alias-VPN Destination: Lan subnet Destination Port Range: From HTTPS(443) to HTTPS(443) Gateway: Opt1GW -VPN Alias-VPN Network: IP Range of remote Office interface (192.168.76.0/24) IP range of WireGuard Interface (10.10.40.0/24) These rules would be replicate (with networks reversed) in the remote PFsense. Please let me know if I'm even remotely going in the right direction. Thanks
  • WG 0.1.5 / pfS+ 21.05.1 - 2 WAN→1 WAN failover, not "failing back"

    19
    1
    0 Votes
    19 Posts
    5k Views
    S
    @luckman212 Trying for the Dual-Tunnel solution now. The floating rules arent binding the tunnels. :(
  • pfSense 25.11 WireGuard Peers Lose Connectivity

    5
    0 Votes
    5 Posts
    318 Views
    planedropP
    Well, interestingly enough, this issue went away with as pfSense reboot. I was having these problems about 1 time per hour before, now it's been 24hrs since the reboot and it hasn't happened a single time. Not sure what was messed up, guessing it was some routing or state table issue, but oh well it seems OK now.
  • Accessing LAN of remote client

    2
    0 Votes
    2 Posts
    148 Views
    patient0P
    @mrwildbob what pfSense version are you using? And how have you setup Wireguard, are you NAT-ting that traffic on your side? Assuming that your and his network IP range are not the same, e.g. your network is 192.168.100.0/24 and his is 192.168.<not-100>.0/24 it is possible. Right now you can reach the RPi and maybe even other clients on the same network as the RPi but the packages don't find their way back to you. On his network all non-local IPs will be forwarded to the Spectrum router and out into the world. First in Wireguard you have to make sure that your are allowed to access his network range. If you can add routes to the Spectrum router you can add your network with the RPi as the gateway. If you can't add routes then you have to setup NAT on the RPi so that for the rest of the network the traffic looks like coming from the RPi and they will send the answers back to the RPi. And the RPi then knows what to do with the traffic destined for Wireguard.
  • 0 Votes
    15 Posts
    5k Views
    P
    @luckman212 Thank you for sharing. I wrote the #15554. I see that Netgate has not shown any interest in this proposal.
  • Wireguard site to site VPN will not work

    24
    0 Votes
    24 Posts
    1k Views
    KOMK
    @sam.newby You need an outbound NAT rule and a LAN rule that directs whatever traffic you want through the tunnel instead of default gateway. I have an alias called VPN_USERS with the IP addresses of those allowed to use the tunnel, and rules that say any traffic bound for 10.10.0.0/16 (company LAN space - don't ask why it's a /16) is routed through the tunnel. Read the Netgate guide I linked to. That's how I configured mine years ago.
  • How to Setup DNS through Wireguard

    6
    0 Votes
    6 Posts
    317 Views
    luckman212L
    Would be helpful if you could provide: IP/subnet details for your "Base LAN" and "Remote LAN" some screenshots of those interface rules screenshot of Firewall > NAT > Outbound screenshot of System > Routing > Static Routes
  • 0 Votes
    2 Posts
    153 Views
    GertjanG
    Can be xplained with : with no firewall rules whatsoever : [image: 1767957636235-3015b3fb-2a1e-4bc7-a765-a3341327f725-image.png] DHCP traffic will work ** - and nothing else. ** because DHCP traffic has 'pass' rules for this interface, they are not shown in the GUI )
  • wireguard - dpinger packet loss on monitor ip

    13
    0 Votes
    13 Posts
    859 Views
    N
    @luckman212 said in wireguard - dpinger packet loss on monitor ip: @nobanzai Sorry where did you ever say you had 2 ISPs? Again that's why I was asking you to give more details and draw a diagram. I just re-read the entire thread and the only public IP block I see mentioned is 193.175.24.0/24 which seems to belong to KNF, Kommunikationsnetz Franken e.V. Sorry, I was just about to update my network documentation and diagrams when I saw the post mentioned above. Instead of finishing the documentation, I changed the port number, and everything worked. However, updating the entire network and routing structure in the documentation takes time. Please bear with me. It will definitely be finished by the next question here.
  • 25.11 Long Boot Time Issue with WireGuard

    Moved
    16
    2
    0 Votes
    16 Posts
    3k Views
    luckman212L
    @mfld Yep here's the commit in case anyone wants to review the change https://github.com/pfsense/FreeBSD-ports/commit/2ad4d245c30b2543e9661c00d497a72624062611
  • WireGuard status shows last handshake -1 years 11 months ago

    5
    3
    0 Votes
    5 Posts
    2k Views
    B
    Still happening at 2025-12-31 5:39 PM (MST). In both pfSense Version 2.7.2-RELEASE (amd64) and Version 2.8.1-RELEASE (amd64).
  • WireGuard alternative AmneziaWG

    5
    0 Votes
    5 Posts
    3k Views
    N
    Learned about AmneziaWG yesterday, this needs to be an option imho. Hope someone picks this up.
  • Enable DHCP server on wireguard interface?

    2
    1
    0 Votes
    2 Posts
    304 Views
    Bob.DigB
    @pfguy2018 I doubt that this will work but interesting, that this seems to be an option?
Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.