I know this must be very simple. However, it is not working for me. I have created a user in the WUI. I downloaded the file to the client machine (Linux Laptop running CahchyOS). When I activate the VPN in NM I get output from the sudo wg show wg0 command.
Can you confirm that all the steps of importing your wireguard configuration file into the laptop NM (Network Manager) were accepted and the whole configuration was successfully saved?
If yes, when you selected the Wireguard VPN connection in the taskbar Network Manager Icon did you get a notification box saying that the connection was successfully made or that it failed?
If notification was that the connection failed to be made then you need to look in the appropriate logs on your laptop to see what messages are there.
Adolf, The connection works and it shows traffic going to IPFire, but there is no return traffic. As far as I can tell there is nothing in the Firewall Logs that relate to a WireGuard connection.
On the Main Page on your IPFire WUi is Wireguard shown in the Network table with the status as online in green and the client pool subnet that you defined when you set up the WireGuard page?
Possibly some helpful information. I went looking around the iptables on the firewall. They all look fine. The only odd thing I found was that although referenced the WGNAT chain did not exist.
When you try and make the wireguard connection do you end up with the Status on the WireGuard WUI page showing a Green CONNECTED or does it stay with a red DISCONNECTED.
The status is updated on a 2 minutes period so it could take this long to show a change. After 2 minutes refresh the WUI page in the browser.
Adolf, I went back to your comment about the NAT Table. Looking at WGNAT in the WUI shows that there are no rules the same as the iptables -L WGNAT command.
Adolf, At one point in the past I tried to get OpenVPN working and gave up. Its subnet was 10.150.223.0/24. OpenVPN shows Stopped. I may have also tried IPSec but I can’t remember. It is not enabled.
I do not quite understand your question “{Do you have a public IP for your internet connection or are you connected via CG-NAT?” The laptop connect through the Blue network or through a phone hotspot. Neither connection works if I Connect the WireGuard VPN.
I decided to give up on my manual nm configuration and did as Iptom did through the NM GUI. The user is now connected to IPFire. I can ssh into IPFire and another host on Green. A browser can reach the internet. The only issue is that I cannot ping any devices on Green.
I am not very familiar with tcpdump outputs but this suggests to me that your IPFire red interface has a Private IP address (192.168.11.110).
This would suggest that you have another modem, possibly from your ISP that is between your internet connection and your IPFire red interface and that it is running in modem mode and not bridged mode otherwise your IPFire red interface would have a Public IP.
If you do have another modem between the internet connection and your IPFire have you created a port forward firewall rule in that modem to ensure that all wireguard traffic is forwarded to your IPfire red interface?
Also your destination port is shown as 45101.
Can you confirm that you used that port number in the Wireguard WUI page in place of the default 51820
192.168.11.110 is a server on Green. 67.85.89.139 is my current Dynamic IP. The WireGuard Port is set to 51820.
When a client (peer) Connected to Blue is on the WG VPN it cannot access the Internet. It can access the IPFire WUI.
The documentation says the the RED and Green rules are created by IPFire. I would therefore assume that a Laptop on Blue with a WG connection should be able to reach the internet as that is one of the main reasons to have the VPN in the first place.
Thanks for the help.
Your Wireguard Road Warrior connection allows a client that is somewhere out on the internet, say at a coffee bar, and that client connects to the coffee bar hotspot and can then connect via a wireguard tunnel to the green network, the same as if that client was directly connected to the green network and therefore also connect to the internet via the red interface.
If your client is connected to the blue network and wants to connect to a machine on the green network then a wireguard tunnel is not required. You just need to create firewall rules to allow that client on blue to access the client(s) on green that you allow.
If you want to have the client on blue connect to somewhere on the internet via a wireguard tunnel, then you need another wireguard server at that other internet location and you would then need to create a net-2-net wireguard tunnel between the two IPFire locations. As the wireguard net-2-net tunnel will be from the green interface on your ipfire then you would need a firewall rule to allow traffic from that client on blue to connect to the wireguard peer connection that is being used for the net-2-net tunnel.
It could be that I am not clear why, where and to what you are trying to connect from the blue client via a wireguard tunnel.
Maybe a simple diagram to show what connection you are trying make might help understanding.