Hi all,
I used to have wireguard connected to my openwrt router WRT32X with no issues at all accessing it via my surface pro and iphone while traveling. I do not what happened or when I changed my settings or update the firmware but I noticed it was not connected anymore.
I will try to list my settings and hope someone could help me. Thanks in advance.
/etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd7a:4e7f:aba8::/48'
option packet_steering '1'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
config interface 'lan'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
option ip6assign '60'
option device 'br-lan.20'
config device
option name 'wan'
config interface 'wan'
option proto 'pppoe'
option device 'wan.10'
option username 'xxxx'
option password 'xxxx'
option ipv6 'auto'
option peerdns '0'
list dns '8.8.8.8'
list dns '8.8.4.4'
config interface 'GUEST'
option proto 'static'
option ipaddr '10.20.30.40'
option netmask '255.255.255.0'
option type 'bridge'
option device 'br-lan.40'
config interface 'IoT'
option proto 'static'
option type 'bridge'
option netmask '255.255.255.0'
option device 'br-lan.30'
option ipaddr '172.16.98.1'
config bridge-vlan
option device 'br-lan'
option vlan '20'
list ports 'lan3:t'
list ports 'lan4:u*'
config bridge-vlan
option device 'br-lan'
option vlan '30'
list ports 'lan1:u*'
list ports 'lan2:u*'
list ports 'lan3:t'
config bridge-vlan
option device 'br-lan'
option vlan '40'
list ports 'lan3:t'
config interface 'purevpntun'
option proto 'none'
option device 'tun0'
config interface 'wan_6'
option proto 'dhcpv6'
option device '@wan'
option reqaddress 'try'
option reqprefix 'auto'
option peerdns '0'
list dns '8.8.8.8'
list dns '8.8.4.4'
list dns '2001:4860:4860::8888'
list dns '2001:4860:4860::8844'
config interface 'wg0'
option proto 'wireguard'
option private_key 'xxxx'
option listen_port '51820'
list addresses '192.168.10.1/24'
list addresses 'fd00:10::1/64'
config wireguard_wg0
option description 'Surface Pro 8'
option preshared_key 'xxxx'
option route_allowed_ips '1'
option endpoint_host 'nayif.duckdns.org'
option endpoint_port '51820'
option persistent_keepalive '25'
option public_key 'xxxx'
list allowed_ips '192.168.10.2/32'
list allowed_ips 'fd00:10::2/128'
config wireguard_wg0
option description 'iPhone'
option public_key 'xxxx'
option preshared_key 'xxxx'
option route_allowed_ips '1'
option endpoint_host 'nayif.duckdns.org'
option endpoint_port '51820'
option persistent_keepalive '25'
list allowed_ips '192.168.10.3/32'
list allowed_ips 'fd00:10::3/128'
/etc/config/firewall
config defaults
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
config zone 'lan'
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
list network 'lan'
list network 'wg0'
config zone 'wan'
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
list network 'wan'
list network 'wan_6'
config forwarding 'lan_wan'
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config zone
option name 'GuestZone'
option output 'ACCEPT'
option forward 'REJECT'
option input 'REJECT'
list network 'GUEST'
config zone
option name 'IoTZone'
option output 'ACCEPT'
option input 'REJECT'
option forward 'REJECT'
list network 'IoT'
config forwarding
option src 'GuestZone'
option dest 'wan'
config rule
option name 'Guest DHCP and DNS'
option src 'GuestZone'
option dest_port '53 67 68'
option target 'ACCEPT'
config forwarding
option src 'IoTZone'
option dest 'wan'
config rule
option name 'IoT DHCP and DNS'
option src 'IoTZone'
option target 'ACCEPT'
option dest_port '53 67 68'
config zone
option name 'vpnfirewall'
option input 'REJECT'
option output 'ACCEPT'
option masq '1'
option mtu_fix '1'
option forward 'REJECT'
list network 'purevpntun'
config forwarding
option src 'lan'
option dest 'vpnfirewall'
config forwarding
option src 'IoTZone'
option dest 'vpnfirewall'
config forwarding
option src 'GuestZone'
option dest 'vpnfirewall'
config forwarding
option src 'lan'
option dest 'IoTZone'
config rule
option name 'Allow-WireGuard'
list proto 'udp'
option src 'wan'
option src_port '51820'
option target 'ACCEPT'
config redirect
option dest 'IoTZone'
option target 'DNAT'
option name 'Allow-qBittorrent'
option src 'wan'
option src_dport '6881'
option dest_ip '172.16.98.4'
option dest_port '6881'
config forwarding
option src 'lan'
option dest 'GuestZone'
wg show
interface: wg0
public key: xxxx
private key: (hidden)
listening port: 51820
peer: xxxx
preshared key: (hidden)
endpoint: 2.90.48.79:51820
allowed ips: 192.168.10.2/32, fd00:10::2/128
transfer: 0 B received, 60.85 KiB sent
persistent keepalive: every 25 seconds
peer: xxxx
preshared key: (hidden)
endpoint: 2.90.48.79:51820
allowed ips: 192.168.10.3/32, fd00:10::3/128
transfer: 0 B received, 60.70 KiB sent
persistent keepalive: every 25 seconds
Interfaces:
Sorry, as a new user, I could only be able to upload one media at the time.