I have a wireguard peer setup and I can connect to it via the Android and Linux wireguard applications and I currently use this peer as exit for internet traffic.
I have currently deployed it on OpenWRT (18.06.1) and I can get a connection correctly with the current setup (I am able to ping from the VPN interface to a resolved host name, google.com, and I can see the RX/TX counters go up accordingly). Setup currently has 2 bridge interfaces with one going directly out the WAN and other going out the VPN.
What do not seem to be able to do is route LAN2 traffic connected to the router via the VPN interface.
Summary:
Remote Wireguard peer works for other clients (Android, Linux)
Internet bound traffic going directly out the WAN interface from LAN works fine.
Internet bound traffic going directly from the WG interface directly works fine. (eg. ping -I wg google.com) and it has associated correctly with the remote wireguard peer.
Internet bound traffic from LAN2 to the WG interface does not work.
config zone
option name 'lan'
option input 'ACCEPT'`
option output 'ACCEPT'
option forward 'ACCEPT'
option family 'ipv4'
option network 'lan'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
option network 'wan wan6'
config zone
option output 'ACCEPT'
option name 'wg'
option masq '1'
option mtu_fix '1'
option input 'ACCEPT'
option forward 'REJECT'
option network 'wg'
config zone
option input 'ACCEPT'
option output 'ACCEPT'
option name 'lan2'
option forward 'ACCEPT'
option family 'ipv4'
option network 'lan2'
config forwarding
option dest 'wan'
option src 'lan'
config forwarding
option dest 'wg'
option src 'lan2'
Or in picture format
I have seen a few topics on this in these forums, however none of the configuration they applied seemed to do the trick. Any help would be much appreciated.
Yes, my apologies, routing table is below. I had a look at that post, and I went through the process of creating another table.
route
Destination Gateway Genmask Flags Metric Ref Use Iface
default <isp_dhcp_gw> 0.0.0.0 UG 0 0 0 eth1
10.88.88.0 * 255.255.255.0 U 0 0 0 br-lan
10.99.99.0 * 255.255.255.0 U 0 0 0 br-lan2
<isp_net> * 255.255.255.0 U 0 0 0 eth1
<remote_wg_ip> <isp_dhcp_gw> 255.255.255.255 UGH 0 0 0 eth1
ip route show
default via <isp_dhcp_gw> dev eth1 proto static src <isp_dhcp_ip>
10.88.88.0/24 dev br-lan proto kernel scope link src 10.88.88.1
10.99.99.0/24 dev br-lan2 proto kernel scope link src 10.99.99.1
<isp_net> dev eth1 proto kernel scope link src <isp_dhcp_ip>
<remote_wg_ip> via <isp_dhcp_gw> dev eth1 proto static
I am assuming I am missing a route from lan2 to wg, I'll have a fiddle with that.