Recently I set up my Raspberry Pi with a Wireguard VPN. Through this VPN I can now connect to the internet using mobile data, and ANY WiFi network I have been using or tried using. - THIS WORKS PERFECT ON MY ANDROID PHONE
Now I would like to expand my possibilities:
I wan't my TRAVEL router (OpenWRT) to do the same thing in order for me and my family for NOT have the WireGuard APP installed to do this.
I have tried many different tutorials, but none seems to work for me
I have the wg.conf files available, but I would like to be able to take this router to new places in the world, plug it into a RJ45 network, AND SURF FROM HOME
Where can I find a solution that works for me?
Does anybody have this setup, and running who can help me out here?
Yes that would be connecting to your router via SSH.
That is the local endpoint IP of your WG Client.
In that case just don't use WG_ADDR6 and also leave it out in the step 4.
Generally these instructions are aligned with the tutorial for Openwrt WG Server. If you already have your own WG Server running you would need to adapt respectively. It may make sense to read the Openwrt WG Server Wiki to see how these settings corresponds.
WG_ADDR (Local endpoint IP of WG Client) - Is this the IP address of my raspberry pi which has the WireGuard VPN installation, or is this the Public IP address which my Wireguard server is behind?
If/Once this is done, I will make a great little tutorial for everybody
This is the local IP that the tunnel interface on your router will take up.
Every "End" of the Wireguard Tunnel has an IP address. On top of that you then enable the routing of the Site LAN (allowed IP's).
You wrote
So how did you configure it on your Android Phone?
Ok at the end of the thread I pointed to is the explanation why you might not have configured it on the Android Phone, it can be assigned dynamically from the Peer. But maybe setting it static makes more sense to have this organized.
#######################
One more thing to know about Endpoint is that you only need to set it on one side of a WireGuard tunnel (but you can set it on both sides if both sides have a static IP). If you set an Endpoint for Peer B in Peer A's config, but you omit it for Peer A in Peer B's config, Peer A will be able to initiate and set up the tunnel with Peer B, without Peer B having to know Peer A's endpoint ahead of time.
This is ideal if Peer A has a dynamically-assigned public IP address; but the drawback is that Peer B won't be able to initiate the tunnel -- it will have to wait for Peer A to connect to it. If you sometimes need for Peer B to initiate a connection to Peer A, you can mitigate this by including a PersistentKeepalive setting for Peer B in Peer A's config -- this will direct Peer A to proactively reach out and connect to Peer B every N seconds (where N is the value you put in the PersistentKeepalive setting).
Welcome @agoralive I am relatively new to Wireguard but here is my understanding in plain English of how it can be used:
Wireguard Client on OpenWrt router at home, connecting to VPN service offered by VPN supplier
Wireguard Server on OpenWrt router to allow Wireguard Client or App etc to connect to your home internet and browse from there.
Wireguard Server on OpenWrt router to allow Wireguard Client on OpenWrt router an example of this might be to create a runnel from your home to work so that you can use systems on their intranet as if you were in the office.
This is not an exhaustive list, I am just trying to show you that the two things you say you are trying to do are very different and may need different Wireguard sofware installed.
In your first example you seemed to be sharing your mobile data to local clients on wifi.
In your second example your OpenWrt Travel Router might be configured as a WireGuard Client and be connected to a second OpenWrt router back at home, as long as the home Openwrt router has Wireguard Server installed and has connection to Internet..
In this scenario you would be creating a tunnel from the Network provided on the RJ45 to your home router.
I recommend you read through the wireguard concepts here and maybe try to find a video on YouTube, it is easier if you find one in your own language.
This is something you can test by having the two OpenWrt routers at home, with the travel one connected to a different Lan, such as a tether off your mobile data.
Not sure whether that is acceptable here, but the people behind the turris routers (based on OpenWrt) released a video how to set up a wireguard site-2-site VPN, which seems pretty close to what you might want to use: https://www.youtube.com/watch?v=ZhkhD7E5wbs
I think that I might just be too stupid and that this will not work for me
I thought I could "just" upload a configuration file to OpenWRT like I do in Android or IOS, which anebles me to use the device as a Tunnel to my private VPN.
I try a lot of things, and all ends up with the router rolling back.
So for a last try I will ask like this:
IS there a tutorial somewhere which lets me connect an OpenWRT router (TP-Link Archer C20) to my Private Rpi Wireguard Server, and then ALL connected devices on the router get's tunneled through my WireGuard private VPN?