I got a little lost in the configuration and the server is three hours away. Therefore here this question.
I also want to understand Wireguard more deeply.
First of all: the tunnel is up now. It is only about routing and firewall.
Server
WAN 192.168.0.0/24 per DHCP
LAN 192.168.80.1/24
Wireguard 192.168.9.1
Client
WAN 192.168.1.0/24 per DHCP
LAN 192.168.81.1/24
Wireguard 192.168.9.2
The tunnel is up.
What routing and firewall rules do I need to get from client to network 192.168.80.0/24 to LAN of server?
Current routing on the server:
Destination Gateway Genmask Flags Metric Ref Use Iface
default 192.168.0.1 0.0.0.0 UG 0 0 0 eth0.2
192.168.0.0 * 255.255.255.0 U 0 0 0 eth0.2
192.168.9.0 * 255.255.255.0 U 0 0 0 vpn
192.168.80.0 * 255.255.255.0 U 0 0 0 br-lan
Current routing on the Client:
Destination Gateway Genmask Flags Metric Ref Use Iface
default 192.168.1.254 0.0.0.0 UG 0 0 0 eth0.2
151.189.145.220 192.168.1.254 255.255.255.255 UGH 0 0 0 eth0.2
192.168.1.0 * 255.255.255.0 U 0 0 0 eth0.2
192.168.9.0 * 255.255.255.0 U 0 0 0 vpn
192.168.81.0 * 255.255.255.0 U 0 0 0 br-lan
Firewall server
VPN interface in a zone with LAN
IPv4 and IPv6 from WAN to this device accept
Firewall Client
VPN interface in a zone with WAN and WAN6
no special rule for Wireguard
Routing can be also be done by using the Allowed IP's of the WireGuard peer, so that you do not need the separate routing rule.
But make sure you enable/tick Route Allowed IPs.
If you want to route everything through the tunnel then use for allowed IPS: 0.0.0.0/0
If you only want traffic for the server to route via the tunnel then use for Allowed IPS: 192.168.80.0/24 192.168.9.0/24
respectively the servers subnet and the WG subnet
Masquerading on the LAN interface can be useful on the server side because your clients on the LAN can have their own firewall and will not allow traffic from the WG subnet.
(Drawback you loose logging and and access control)
Typically it is set up with symmetric routing -- no NAT. Each side configures the other side's LAN as allowed_ips from the peer, and enable route_allowed_ips. It is necessary that all the IP ranges involved do not overlap. The IP ranges proposed in the original post are OK.
The simplest firewall configuration is to place the tunnel in the lan zone on both ends. This assumes that everything in both LANs is trustworthy. Do that initially to get it working-- later if you want to block some things in the firewall you can convert to a separate zone, which also requires adding forwarding rules. The zone containing the tunnel should usually allow input so you can log into the remote router itself on its tunnel IP.