This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| vpn-wireguard [2025/09/29 18:45] – [Status] -Delete orig. (now dupe) "first block of text" paragraph hogwild | vpn-wireguard [2026/03/08 21:42] (current) – pedro | ||
|---|---|---|---|
| Line 7: | Line 7: | ||
| Note that tabs or other interface components in your menus may be different colours, depending on which web interface theme is chosen in the Admin Access menu. | Note that tabs or other interface components in your menus may be different colours, depending on which web interface theme is chosen in the Admin Access menu. | ||
| - | This HOWTO: | + | For an introduction to WireGuard, and some basic theory, the [[wireguard_on_freshtomato|Set up WireGuard]] |
| Unless using an external VPN provider, it's best to " | Unless using an external VPN provider, it's best to " | ||
| Note that WireGuard only supports UDP stream, not TCP. | Note that WireGuard only supports UDP stream, not TCP. | ||
| - | |||
| ===== Current development status ===== | ===== Current development status ===== | ||
| Line 35: | Line 34: | ||
| * Integrity VPN | * Integrity VPN | ||
| * NordVPN | * NordVPN | ||
| - | * PIA (Private Internet Access | + | * PIA (Private Internet Access) |
| * ProtonVPN | * ProtonVPN | ||
| * SurfShark | * SurfShark | ||
| Line 46: | Line 45: | ||
| [[https:// | [[https:// | ||
| + | ===== Scripts ===== | ||
| + | |||
| + | The Scripts tab allows you to define custom shell commands that are executed automatically at specific stages of the WireGuard interface lifecycle. This is useful for starting or stopping additional services, adding firewall rules (e.g. iptables), or configuring custom routing when the tunnel comes up or goes down. \\ \\ There are four script hooks available: | ||
| + | |||
| + | * Pre-Up Script – runs before the interface is brought up | ||
| + | * Post-Up Script – runs after the interface has been brought up | ||
| + | * Pre-Down Script – runs before the interface is taken down | ||
| + | * Post-Down Script – runs after the interface has been taken down | ||
| + | |||
| + | To reference the current WireGuard interface name dynamically within any script, use '' | ||
| + | |||
| + | Example: | ||
| + | |||
| + | > | ||
| ===== Status ===== | ===== Status ===== | ||
| Line 62: | Line 75: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Wireguard Configuration ===== | ===== Wireguard Configuration ===== | ||
| Line 85: | Line 97: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Interface ===== | ===== Interface ===== | ||
| Line 99: | Line 110: | ||
| \\ | \\ | ||
| - | **Poll Interval** - WireGuard's PersistentKeepalive setting. | + | **Poll Interval** - a watchdog timer for the WireGuard |
| - | + | ||
| - | This determines how often clients behind NAT send keepalive packets to maintain NAT mappings. | + | |
| - | + | ||
| - | \\ | + | |
| - | * The recommended setting is 25 seconds. | + | This causes |
| - | * Default: 0. This disables the feature, so packets are sent only\\ as needed. This is fine for most users not behind restrictive NAT. | + | |
| \\ | \\ | ||
| Line 222: | Line 228: | ||
| * Routing Policy - this lets you create rules, specifying which devices \\ or destination addresses/ | * Routing Policy - this lets you create rules, specifying which devices \\ or destination addresses/ | ||
| * Routing Policy (Strict) - only explicitly-defined traffic will go through the\\ tunnel. All other traffic is excluded and can't use the tunnel. | * Routing Policy (Strict) - only explicitly-defined traffic will go through the\\ tunnel. All other traffic is excluded and can't use the tunnel. | ||
| - | |||
| ===== Peer Parameters ===== | ===== Peer Parameters ===== | ||
| Line 289: | Line 294: | ||
| \\ | \\ | ||
| - | |||
| ===== Import Config from file ===== | ===== Import Config from file ===== | ||
| Line 320: | Line 324: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Peers ===== | ===== Peers ===== | ||
| - | |||
| This section allows you to enter and view settings for all peers of this WireGuard interface/ | This section allows you to enter and view settings for all peers of this WireGuard interface/ | ||
| Line 368: | Line 370: | ||
| \\ | \\ | ||
| - | |||
| ===== Peer's Parameters ===== | ===== Peer's Parameters ===== | ||
| Line 427: | Line 428: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Status ===== | ===== Status ===== | ||
| Line 457: | Line 457: | ||
| - Latest Handshake performed | - Latest Handshake performed | ||
| - Number of bytes sent and received by this peer | - Number of bytes sent and received by this peer | ||
| - | |||
| ===== WireGuard Notes and Troubleshooting ===== | ===== WireGuard Notes and Troubleshooting ===== | ||
| Line 470: | Line 469: | ||
| \\ | \\ | ||
| - | |||
| ==== General Troubleshooting ==== | ==== General Troubleshooting ==== | ||
| Line 486: | Line 484: | ||
| * Remote LAN IP | * Remote LAN IP | ||
| - | | + | |
| \\ | \\ | ||
| + | |||
| + | ==== Problem: Traffic flowing in only one Direction ==== | ||
| \\ | \\ | ||
| + | |||
| + | Sometimes, it may occur that from one end of your setup (" | ||
| + | |||
| + | It this occurs, please check that there are default routes setup from B to A. Also, please check that on the client side, (in this case, end B), the " | ||