I've been researching topics here on this exact problem, and I've been attempting a solution at achieving the following goals:
- Have a Wireguard Server setup to access LAN devices remotely from LAPTOP (done)
- For all other traffic going through Wireguard Server, forward it to a WireGuard Client using a commercial VPN. Reason: I can allow multiple devices to connect to the Commercial VPN, as the Commercial VPN limits the keys given out.
Here is my current approach I've attempted:
- Create a WireGuard Server in zone WG_SERVER [inherit LAN permissions]
- Create a WireGuard Client in zone WG_CLIENT [inherit WAN permissions]
- Forward WG_SERVER -> WG_CLIENT in the firewall
Right now, I don't have issues with the WireGuard Server accessing LAN, but forwarding the rest of my traffic to the WireGuard Client is what I'm having difficulty with.
The issue is, I'm not sure how to configure the allowing all traffic to flow through the WireGuard Server from LAPTOP without disrupting the usual traffic for devices on LAN. I attempted adding the Allowed IPs 0.0.0.0/0
to the WireGuard Server/LAPTOP, but that was a mistake, as all traffic (LAN included) attempted to go through WireGuard Server and fail.
Main thread I was reading was here.
Below is the advice I was somewhat following.
It depends on your implementation. If the WG server is meant for local lan access only, then it needs a separate zone and only lan zone forwarding. If you also want to access the internet though Mullvad, then you can assign it to lan zone, without any other changes. If you only want to provide internet via Mullvad without lan access, then you need to create a new zone and allow forwarding to Mulvad.
I'm not sure if there is a policy based routing solution that could address this.