pfSense 2.5.0 WireGuard Site-to-Site VPN

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ก.ย. 2024

ความคิดเห็น • 54

  • @Practical-IT
    @Practical-IT 3 ปีที่แล้ว +9

    Well done Travis. This is one of the first videos to pop up for pfSense 2.5.0.

  • @boink800
    @boink800 3 ปีที่แล้ว +1

    Wireguard works very much like ssh (if you use ssh with keys only). Big point: Wireguard works in kernel space (as a module), while other VPN apps work in user space.

  • @user-sr7fo5fe6x
    @user-sr7fo5fe6x 3 ปีที่แล้ว

    Excellent..... the fudging, the explanations, the fixes, it was all great. Please do more. I like the style, very matter of fact as if I was 'fudging my way through it along with you.' Thank you.

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว

      Thank you! This is the first time I've received a compliment on my style. I don't like adding extra fluff (I've tried it, but I don't like it) and I try to minimize as much editing as possible. Glad you like it! I'll be doing more as my schedule permits!

  • @kevindd992002
    @kevindd992002 3 ปีที่แล้ว

    Travis, these are my comments:
    1. I suggest you also include the tunnel transit network (in your case, it's 10.235.0.0/24) to the "Allowed IP's" field of the peer settings. Without it, gateway monitoring does not seem to work.
    2. Add the WG rules on the WG Interface tab and NOT on the WG group tab (where you added them in your video). This is so that reply-to's will work (if you need them). This is documented in the Netgate documentation pages. If you add rules in the WG group tab, those will affect all WG interfaces (if you have multiple) and are always evaluated first. If you keep the WG group tab empty and add your custom rules in each individual WG interface, then you get more granular and reply-to's will work.
    I just setup my WG S2S now by following your guide and these are the two things that I noticed are lacking.

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว +1

      Thank you for these tips! I appreciate it. Like I said, I'm a noob when it comes to Wireguard and have always struggled to get it working. I'm going to pin this comment as it could be helpful to others!

  • @ronw6808
    @ronw6808 3 ปีที่แล้ว

    Thanks for taking the time to create a howto video on this. It was very helpful!

  • @AFiB1999
    @AFiB1999 3 ปีที่แล้ว +1

    That is awesome. I was wondering if you could do a pFsense Wireguard configuration with pia vpn. Thanks

  • @XrayDoc88
    @XrayDoc88 3 ปีที่แล้ว +1

    Given the recent update, my question is not very timely. I mostly followed your instructions, but I'm new to VPNs. Do you really only need to add the firewall rules to the host pfSense installation? I didn't see you making similar settings on your client pfSense.

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว

      Yeah do not use WireGuard on pfSense. See my blog post in the description. In fact, I’d almost say stop using pfSense and move to OPNSense. Netgate is a terrible company that seems to thrive on drama. Back to your question, I might have left a firewall rule in place. But yes, you’d want a rule that allows each side.

  • @muhammadbutt7994
    @muhammadbutt7994 3 ปีที่แล้ว +1

    Thank you very much. Very simple and easy to follow guide. Just one question, please see at 8:34
    On 10.200.6.1
    Peer WG Address => 10.235.0.2/24
    On 10.200.5.1
    Peer WG Address => 10.235.0.2/32
    Shouldn't those be on different IPs and the same subnet instead of /24 and /32?

  • @kimh9337
    @kimh9337 3 ปีที่แล้ว

    Thanks mate. Hope you wear a cape these days :)

  • @davidg4512
    @davidg4512 3 ปีที่แล้ว +2

    You must be grandfathered into the verification status on youtube. I thought it was 100k subs minimum. Could you explain?

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว

      Yes, I’ve been here a _really_ long time.

  • @binnihh
    @binnihh 3 ปีที่แล้ว

    Do a new video with the wireguard add on in 2.5.2 pls.

  • @fbifido2
    @fbifido2 3 ปีที่แล้ว +2

    1. How would you lock it down ???
    On main-server: set source to client-wan-ip:UDP, set destination to server-wan-ip / port=51820, then allow
    On Client: set source to server-wan-ip:UDP, set destination to client-wan-ip / port=51820, then allow
    2. You have in Rules WAN, OPT1, WireGuard, how does that traffic work here?
    Which interface get the traffic first?
    The main lock down happens on the WAN interface, so what traffic goes to the OPT1 interface ???
    The WireGuard interface is after the link is established, yes? This affect the communication within the tunnel.

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว

      Exactly. You wouldn’t be able to have dynamic endpoints but you’d control the endpoints that could connect. Just another layer of the security onion!

    • @fbifido2
      @fbifido2 3 ปีที่แล้ว

      @@TravisNewton1 What if you have WAN1, WAN2 and WAN3 ??? How do you group them ?

    • @kevindd992002
      @kevindd992002 3 ปีที่แล้ว

      @@fbifido2 System -> Routing -> Gateway Groups

  • @angelorestrepo
    @angelorestrepo 2 ปีที่แล้ว

    Is there a way to state what IP address can connect to the other site so not all traffic connects to site to site setup? Also, can this somehow be setup while you're running wireguard to specified addresses to a VPN provider?

  • @RanaBibu
    @RanaBibu 3 ปีที่แล้ว

    Sir you are awesome. You Save my job 😉.

  • @JasonLeaman
    @JasonLeaman 3 ปีที่แล้ว

    Well done Thanks for the video !

  • @fonte935
    @fonte935 3 ปีที่แล้ว

    Nice! Thank you.

  • @chrisjchalifoux
    @chrisjchalifoux 3 ปีที่แล้ว

    Ty For The Video

  • @KptnKMan360
    @KptnKMan360 3 ปีที่แล้ว

    Nice, thanks.

  • @sreyu08
    @sreyu08 3 ปีที่แล้ว

    @13.38 you had mentioned we need to create a static route to the other side using the new interface. But for me, there was no static route created for this interface by default. So should I create a new route?

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว

      So it turns out it wasn't needed. When I first set this up, I had to create a route as there was no route in place. When I re-did it for this video, a route was automatically created since the interface is local.

    • @sreyu08
      @sreyu08 3 ปีที่แล้ว

      @@TravisNewton1 since I am new to this, it would be better if you can put the route Definition based on this video. Since my tunnel is not working and only static route is missing.

    • @sreyu08
      @sreyu08 3 ปีที่แล้ว

      I recreated the tunnel & now the static route automatically got created and my tunnel is up. Not sure what happens with the initial configuration. Thanks, you had done an amazing video

  • @SuperChelseaSW6
    @SuperChelseaSW6 3 ปีที่แล้ว

    Nice video sir. Make a demo how zeek works

  • @Francis_UD
    @Francis_UD 3 ปีที่แล้ว

    Can such configuration circumvent GFW?

  • @kimh9337
    @kimh9337 3 ปีที่แล้ว

    Question. I see that you define the InterfaceIP with X.X.X.X/24. But when you add the IP in the peer config, you type it in as X.X.X.X/32 ?

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว

      I’m not actually sure. I’ll try it again with /24 to see if it works but I think you’re telling the interface “THIS is your IP”. Just like how if you want to identify a single IPv4 address in an alias among networks, you use /32. I could be wrong. But I’ll try it again.

    • @Mcfryguy5555
      @Mcfryguy5555 3 ปีที่แล้ว +1

      www.ionos.com/digitalguide/server/know-how/cidr-classless-inter-domain-routing/ im no expert but I think the/32 only allows 1 address to connect

    • @kevindd992002
      @kevindd992002 3 ปีที่แล้ว +1

      x.x.x.x/32 is the same as simply specifying a single IP (x.x.x.x). To keep it simple, just do x.x.x.x in the peer IP address field.

    • @kimh9337
      @kimh9337 3 ปีที่แล้ว

      @@kevindd992002 I suspected it as such. Thx for confirming :)

  • @jk55.
    @jk55. 3 ปีที่แล้ว +1

    👍

  • @bulliontoy
    @bulliontoy 2 ปีที่แล้ว

    Outdated and doesn't apply. Gw port needs to be made. Tunnel interface look different

  • @fuzz1252
    @fuzz1252 3 ปีที่แล้ว

    How are you verifyed

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว +1

      It wasn’t a status symbol back in 2011.

  • @l0gic23
    @l0gic23 2 ปีที่แล้ว

    +1 sub

  • @random_tech_stuff
    @random_tech_stuff 3 ปีที่แล้ว

    Thanks for this video!
    Can I use Wireguard to connect my Android smartphone to my pfSense box?
    I'm currently doing that with OpenVPN and was wondering if I can replace it with Wireguard.

    • @TravisNewton1
      @TravisNewton1  3 ปีที่แล้ว

      You can! However, I have not done this yet with either iOS, Android, or even stand alone Windows/Mac clients, but I know there can be a bit of a process getting the config loaded. I currently use OpenVPN for connecting these clients to my network, just because it is tried and true, and not that much of a hassle.