Wow! This is escalating and more complicated than I had anticipated. We shall see if I can keep up. I am doing what I can but it is all very complicated for me and I may have made mistakes or introduced errors. All this file transferring and editing is a bit confusing and easy for me to make mistakes.
I have removed the listen port from the client as you said.
Regarding what you say that the client uses a random port number I trust this is set up by WG and I do not need to forward this port at the router level to the client... which is impossible since we don't know the port number. So I trust I do not need to be concerned with this and I will just leave the issue aside.
On the server side, regarding "two networks interfaces are invalid because they are the same address and subnet as your lan", I am confused by this. Those two interfaces are the two 2.4 and 5 band WiFi interfaces and they appeared there when I installed OpenWRT. It seems to me they need to be on the same subnet as the Ethernet LAN. Rather than delete or change anything I have just disabled both WiFis as I can get by without WiFi for now and I can deal with this issue once I have the VPN working ... a target which seems to be moving away rather than closer.
So, on the server side now I only have three interfaces UP: Ethernet IPV4 LAN, Ethernet WAN and Wireguard VPN.
On the client side I have Ethernet IPV4 LAN, WG_VPN and WiFi WWAN enabled and the rest, including Ethernet WAN, disabled.
Regarding your comment "And there is one more issue -- your 'server' and 'client' router's have the same subnet for the lan. They must be different. Change the address on one or the other, ideally to a really uncommon one such as 192.168.132.1." I understand what you mean but with OpenVPN I had them on the same subnet without problem precisely so they could be mutually "local". What I do to prevent address collisions is all devices have static IPs assigned to avoid any duplicates. This is what I want, if possible, and it works fine with OpenVPN. Can it work the same way with Wireguard provided I avoid duplicate IPs?
I am posting the Server side files for now before I mess up much more and will post the client side later.
With these changes I have made so far I still cannot get to ping 10.8.1.1 from the client.
I appreciate your help. Thanks.
cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix '.......::/48'
config device
option name 'br-lan'
option type 'bridge'
list ports 'eth1.1'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.0.1'
option netmask '255.255.255.0'
option delegate '0'
config interface 'wan'
option device 'eth0.2'
option proto 'dhcp'
config interface 'wan6'
option device 'eth0.2'
option proto 'dhcpv6'
config switch
option name 'switch0'
option reset '1'
option enable_vlan '1'
config switch_vlan
option device 'switch0'
option vlan '1'
option ports '2 3 4 5 0t'
config switch_vlan
option device 'switch0'
option vlan '2'
option ports '1 6t'
config interface 'WLAN'
option proto 'static'
option device 'phy0-ap0'
list ipaddr '192.168.0.1'
config interface 'WLAN5'
option proto 'static'
option device 'phy1-ap0'
option ipaddr '192.168.0.1'
option netmask '255.255.255.0'
config device
option name 'phy0-ap0'
option ipv6 '0'
config device
option name 'phy1-ap0'
option ipv6 '0'
config interface 'Wireguard'
option proto 'wireguard'
option private_key '......='
option listen_port '5p9'
list addresses '10.8.1.1/24'
config device
option name 'Wireguard'
option ipv6 '0'
config wireguard_Wireguard
option description 'Client1'
option public_key '.........='
option endpoint_port '5p9'
config device
option name 'eth0'
option ipv6 '0'
config device
option name 'eth0.2'
option type '8021q'
option ifname 'eth0'
option vid '2'
option ipv6 '0'
config device
option name 'eth1'
option ipv6 '0'
config device
option name 'eth1.1'
option type '8021q'
option ifname 'eth1'
option vid '1'
= = = = = = = = = = = = = = =
cat /etc/config/firewall
config defaults
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
list network 'lan'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
list network 'wan'
list network 'wan6'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config zone
option name 'Wireguard'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option masq '1'
option mtu_fix '1'
list network 'Wireguard'
config forwarding
option src 'Wireguard'
option dest 'lan'
config forwarding
option src 'Wireguard'
option dest 'wan'
config forwarding
option src 'lan'
option dest 'Wireguard'
config redirect
option dest 'lan'
option target 'DNAT'
option name 'Wireguard'
option src 'wan'
option src_dport '5p9'
option dest_ip '10.8.1.1'
option dest_port '5p9'