This is the most current video but it is missing the second part that everyone else does. A complete wireguard vpn setup video is currently not available.
hands down, was literally pulling my hair out. Could not see connection on the the main wireguard server. Everyone kept giving me directions to create wireguard server when I was trying to add a client.🙏🏽 Now if I could just figure out how to get opnsense clients through that VPN. I could relax
might be I'm wrong but "Public Key" in "Instance" tab is NOT same! It must be generated on OpnSense CLI by using command: echo | wg pubkey and after it can be put in the field "Public Key" (If these fields PREpopulated you may need change them to yours)
In one of your comments you stated that it is a five minute set up because the client is set up but what you did with the OPN sense firewall is actually server-side so technically it would be the server is set up so the clients can connect to the server or am I missing something because the client would be for example, a mobile phone connecting to the wire guard server, and another client could be a laptop connecting to the wire guard server etc….
Not sure which comment exactly you are referring to so it would be hard to respond. But this is setting up OPNSense to connect to a service like SurfShark, NORD or VPNUnlimited.
Nice tutorial, when you create a nat rule do not create the rule on the wireguard group but create a interface for the tunnel and apply the rule there, because when you have multiple tunnels everything breaks when you nat on te wireguard group interface, i currently have 5 tunnels with failover and loadbalancing with no problems but it took me ages to figure everything out also dont forget to create a static route from youre peer ip to youre dhcp wan interface to keep the tunnel Alive for dppinger and if you use unbound and want the local dns resolver to work without dns leaks you put the dns of your vpn provider in the system dns and force it to use the gateway of the vpn provider then you can set unbound to use the dns of the system, you can also add the dns of youre provider in the monitor ip for dpinger that creates also a static route for the dns to that gateway.
Hi there, it sounds like you have this sorted out. Can you help me create vlans that have separate vpn on each vlan? I’m trying to route VMs to different vpns. Thanks!
Skips over interfaces, generating the client keys, server keys, and firewall rules. Not really sure this qualifies for a 5 minute setup since half of the steps were done off video...
Merry Christmas Jesse. Actually when you are setting it up as a client to Nord, SurfShark, ExpressVPN etc. you do not have to generate client keys. Those are provided by the service. Firewall rules will be done in a separate video and really will vary greatly depending on the particular use case. The client is set up and functioning so it really is a 5 minute setup of JUST the client. If you have any specific questions please ask.
Cool. Yeah I saw tons of videos on how to set up the self hosted. I struggled with and saw lots of posts on forums struggling with setting up a VPN client. What made it even more confusing was finding partial answers or answers that were for os-wireguard-go (old outdated version) and nothing for the latest version.
Literally same. I only had the peer and other tabs but the videos I initially looked up had an endpoint tab and it confused me.
Glad it helped!
This is the beat guide. Thank you!!! Im gonna switch back to opnsense this weekens
Glad it helped!
This is the most current video but it is missing the second part that everyone else does. A complete wireguard vpn setup video is currently not available.
This worked, it connects and I get a handshake but been having issues with the firewall to force everything to go out via the vpn
Thanks. If I have a minute I’ll do a follow up on how to send stuff out through the VPN.
hands down, was literally pulling my hair out. Could not see connection on the the main wireguard server. Everyone kept giving me directions to create wireguard server when I was trying to add a client.🙏🏽 Now if I could just figure out how to get opnsense clients through that VPN. I could relax
Thank you. I’m going to try to do a video on sending things out through the VPN soon.
might be I'm wrong but "Public Key" in "Instance" tab is NOT same! It must be generated on OpnSense CLI by using command: echo | wg pubkey and after it can be put in the field "Public Key" (If these fields PREpopulated you may need change them to yours)
This is setting up a client for Nord or others like it. So they need to be populated with keys supplied by the service not generated by OPNSense.
What generated the config file and where is it located hard for someone to follow along when they have an empty file to refer to 😂
The service you are connecting to generated the config file. Nord, SurfShark, VPNUnlimited...........
In one of your comments you stated that it is a five minute set up because the client is set up but what you did with the OPN sense firewall is actually server-side so technically it would be the server is set up so the clients can connect to the server or am I missing something because the client would be for example, a mobile phone connecting to the wire guard server, and another client could be a laptop connecting to the wire guard server etc….
Not sure which comment exactly you are referring to so it would be hard to respond. But this is setting up OPNSense to connect to a service like SurfShark, NORD or VPNUnlimited.
Nice tutorial, when you create a nat rule do not create the rule on the wireguard group but create a interface for the tunnel and apply the rule there, because when you have multiple tunnels everything breaks when you nat on te wireguard group interface, i currently have 5 tunnels with failover and loadbalancing with no problems but it took me ages to figure everything out also dont forget to create a static route from youre peer ip to youre dhcp wan interface to keep the tunnel Alive for dppinger and if you use unbound and want the local dns resolver to work without dns leaks you put the dns of your vpn provider in the system dns and force it to use the gateway of the vpn provider then you can set unbound to use the dns of the system, you can also add the dns of youre provider in the monitor ip for dpinger that creates also a static route for the dns to that gateway.
Hi there, it sounds like you have this sorted out. Can you help me create vlans that have separate vpn on each vlan? I’m trying to route VMs to different vpns. Thanks!
Skips over interfaces, generating the client keys, server keys, and firewall rules. Not really sure this qualifies for a 5 minute setup since half of the steps were done off video...
Merry Christmas Jesse. Actually when you are setting it up as a client to Nord, SurfShark, ExpressVPN etc. you do not have to generate client keys. Those are provided by the service. Firewall rules will be done in a separate video and really will vary greatly depending on the particular use case. The client is set up and functioning so it really is a 5 minute setup of JUST the client. If you have any specific questions please ask.
@@ziggypuppyproductions7453 Oh I see. This is for VPN client not self hosted. I misunderstood
Cool. Yeah I saw tons of videos on how to set up the self hosted. I struggled with and saw lots of posts on forums struggling with setting up a VPN client. What made it even more confusing was finding partial answers or answers that were for os-wireguard-go (old outdated version) and nothing for the latest version.