This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| vpn-wireguard [2025/11/11 00:07] – [General Troubleshooting] -Change to "point of failure you find" hogwild | vpn-wireguard [2026/03/08 21:42] (current) – pedro | ||
|---|---|---|---|
| Line 7: | Line 7: | ||
| Note that tabs or other interface components in your menus may be different colours, depending on which web interface theme is chosen in the Admin Access menu. | Note that tabs or other interface components in your menus may be different colours, depending on which web interface theme is chosen in the Admin Access menu. | ||
| - | This HOWTO: | + | For an introduction to WireGuard, and some basic theory, the [[wireguard_on_freshtomato|Set up WireGuard]] |
| Unless using an external VPN provider, it's best to " | Unless using an external VPN provider, it's best to " | ||
| Note that WireGuard only supports UDP stream, not TCP. | Note that WireGuard only supports UDP stream, not TCP. | ||
| - | |||
| ===== Current development status ===== | ===== Current development status ===== | ||
| Line 35: | Line 34: | ||
| * Integrity VPN | * Integrity VPN | ||
| * NordVPN | * NordVPN | ||
| - | * PIA (Private Internet Access | + | * PIA (Private Internet Access) |
| * ProtonVPN | * ProtonVPN | ||
| * SurfShark | * SurfShark | ||
| Line 46: | Line 45: | ||
| [[https:// | [[https:// | ||
| + | ===== Scripts ===== | ||
| + | |||
| + | The Scripts tab allows you to define custom shell commands that are executed automatically at specific stages of the WireGuard interface lifecycle. This is useful for starting or stopping additional services, adding firewall rules (e.g. iptables), or configuring custom routing when the tunnel comes up or goes down. \\ \\ There are four script hooks available: | ||
| + | |||
| + | * Pre-Up Script – runs before the interface is brought up | ||
| + | * Post-Up Script – runs after the interface has been brought up | ||
| + | * Pre-Down Script – runs before the interface is taken down | ||
| + | * Post-Down Script – runs after the interface has been taken down | ||
| + | |||
| + | To reference the current WireGuard interface name dynamically within any script, use '' | ||
| + | |||
| + | Example: | ||
| + | |||
| + | > | ||
| ===== Status ===== | ===== Status ===== | ||
| Line 62: | Line 75: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Wireguard Configuration ===== | ===== Wireguard Configuration ===== | ||
| Line 85: | Line 97: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Interface ===== | ===== Interface ===== | ||
| Line 101: | Line 112: | ||
| **Poll Interval** - a watchdog timer for the WireGuard connection (in minutes) | **Poll Interval** - a watchdog timer for the WireGuard connection (in minutes) | ||
| - | If we can' | + | This causes FreshTomato to ping 1.1.1.1 via the WireGuard interface. If no reply is received in time, the wg service |
| - | + | ||
| - | * The recommended setting is 25 seconds. This causes WireGuard \\ to send a small packet to its peer every 25 seconds when no \\ other traffic occurs. This keeps the connection alive through \\ NAT or firewalls that might otherwise close idle UDP sessions. \\ \\ | + | |
| - | * Default: 0. This disables the feature, so packets are sent only\\ as needed. This is fine for most users not behind restrictive NAT. | + | |
| \\ | \\ | ||
| Line 220: | Line 228: | ||
| * Routing Policy - this lets you create rules, specifying which devices \\ or destination addresses/ | * Routing Policy - this lets you create rules, specifying which devices \\ or destination addresses/ | ||
| * Routing Policy (Strict) - only explicitly-defined traffic will go through the\\ tunnel. All other traffic is excluded and can't use the tunnel. | * Routing Policy (Strict) - only explicitly-defined traffic will go through the\\ tunnel. All other traffic is excluded and can't use the tunnel. | ||
| - | |||
| ===== Peer Parameters ===== | ===== Peer Parameters ===== | ||
| Line 287: | Line 294: | ||
| \\ | \\ | ||
| - | |||
| ===== Import Config from file ===== | ===== Import Config from file ===== | ||
| Line 318: | Line 324: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Peers ===== | ===== Peers ===== | ||
| - | |||
| This section allows you to enter and view settings for all peers of this WireGuard interface/ | This section allows you to enter and view settings for all peers of this WireGuard interface/ | ||
| Line 366: | Line 370: | ||
| \\ | \\ | ||
| - | |||
| ===== Peer's Parameters ===== | ===== Peer's Parameters ===== | ||
| Line 425: | Line 428: | ||
| {{:: | {{:: | ||
| - | |||
| ===== Status ===== | ===== Status ===== | ||
| Line 455: | Line 457: | ||
| - Latest Handshake performed | - Latest Handshake performed | ||
| - Number of bytes sent and received by this peer | - Number of bytes sent and received by this peer | ||
| - | |||
| ===== WireGuard Notes and Troubleshooting ===== | ===== WireGuard Notes and Troubleshooting ===== | ||
| Line 468: | Line 469: | ||
| \\ | \\ | ||
| - | |||
| ==== General Troubleshooting ==== | ==== General Troubleshooting ==== | ||
| Line 484: | Line 484: | ||
| * Remote LAN IP | * Remote LAN IP | ||
| - | | + | |
| \\ | \\ | ||
| + | |||
| + | ==== Problem: Traffic flowing in only one Direction ==== | ||
| \\ | \\ | ||
| + | |||
| + | Sometimes, it may occur that from one end of your setup (" | ||
| + | |||
| + | It this occurs, please check that there are default routes setup from B to A. Also, please check that on the client side, (in this case, end B), the " | ||