Difference between revisions of "Wireguard Peer To Peer Configuration example"

From Teltonika Networks Wiki
m
(WireGuard Peer To Peer Configuration)
(23 intermediate revisions by 3 users not shown)
Line 1: Line 1:
==Introduction==
+
<nowiki>==Introduction==</nowiki>
WireGuard is a simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography. This example covers Peer-to-Peer configuration and LAN-to-LAN connectivity using WireGuard VPN.<br><br>
 
'''Note:''' If you do not see WireGuard in '''Services → VPN'''. Go to '''System → Package Manager → Packages''' page and install it from there.
 
  
==Prerequisites==
 
For this example, you will need:
 
*Three RUTOS devices with different LAN networks
 
*One RUTOS device will need to have a '''Public IP''' address
 
*An end device with the ability to install, set up WireGuard client, and configure RUTOS devices<br>
 
'''Note:''' remember to switch the '''WebUI''' into '''Advanced''' mode.
 
  
==Topology used in this example==
+
Introduction to a Peer-to-Peer WireGuard configuration example, this also covers LAN-TO-LAN connectivity aspect as well.
[[File:Wireguard peer to peer config example topology v3.png|border|class=tlt-border]]
 
  
==WireGuard instance creation==
+
<nowiki>'''WireGuard'''</nowiki> is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.
To create a WireGuard interface follow these steps:
 
*Connect to WebUI
 
*Go to '''Services → VPN → Wireguard'''
 
*Enter the interface '''name''' and press '''Add'''
 
[[File:Add_wireguard_instance.png|border|class=tlt-border]]
 
  
== WireGuard instance general configuration==
+
This page will show you an example on how to configure a basic tunnel between WireGuard interface and its peers.
In this example, each interface’s general settings will be similar for all RUTOS devices. The difference will be in the assigned IP address. To set up the general configuration, follow these steps:
 
*When you have pressed [[File:Networking_rutx_manual_edit_button_v1.png]] near the WireGuard interface, go to the '''General Setup''' section
 
*'''Enable''' the interface
 
*Press [[File:Networking_rutx_manual_generate_button_v1.png]]
 
*Take note of the interface’s public key
 
*Set an IP address. For the '''server''' set '''10.0.0.1/24'''. For the '''clients''' set the IP to '''10.0.0.2/24 and higher'''. For example, client #1 – IP 10.0.0.2/24, client #2 – IP 10.0.0.3/24, and so on
 
Below is an example of the server’s WireGuard interface:<br>
 
[[File:Wireguard server interface config example v1.png|border|class=tlt-border]]
 
  
==Peers Configuration==
+
<nowiki><u><b>Note:</b></nowiki> WireGuard is additional software that can be installed from the <nowiki><b>Services → Package Manager</b></nowiki> page<nowiki></u></nowiki> (in RUT9/RUT2 this page is located in <nowiki><b>System → Package Manager</b></nowiki>).
Next, we will add WireGuard peers. Go to each device's WireGuard interface and go to the Peers section (below the interface’s general/advanced settings).
 
===Client 1 configuration===
 
To create client #1 to server/peer configuration, follow these steps:
 
*Enter the instance '''name''' (for example, server) and press '''Add'''
 
*As '''Public Key''' set the server’s public key. To find it go to the server’s WireGuard interface settings. There you will find the public key
 
*As '''Endpoint host''' set the server’s public IP
 
*In the '''Allowed IPs''' add IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network
 
*Additionally, you can write the peer’s description
 
*Enable '''Route allowed IPs'''
 
*Press [[File:Save apply button.png]]
 
The configuration could look like this:<br>
 
[[File:Wireguard client1 to server peer v2.png|border|class=tlt-border]]
 
  
===Client 2 configuration===
+
<nowiki>==Prerequisites==</nowiki>
To create client #2 to server/peer configuration, follow these steps:
 
*Enter the instance '''name''' (for example, server) and press '''Add'''
 
*As '''Public Key''' set the server’s public key. To find it go to the server’s WireGuard interface settings. There you will find the public key
 
*As '''Endpoint host''' set the server’s public IP
 
*In the '''Allowed IPs''' add IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network
 
*Additionally, you can write the peer’s description
 
*Enable '''Route allowed IPs'''
 
*Press [[File:Save apply button.png]]
 
The configuration could look like this:<br>
 
[[File:Wireguard client2 to server peer v2.png|border|class=tlt-border]]
 
  
===Client 3 configuration===
 
Firstly, ensure that you have downloaded and installed WireGuard client ([https://www.wireguard.com/install/ wireguard.com/install]) for your PC. To create client #3 to server/peer configuration, follow these steps:
 
*Launch the WireGuard software
 
*At the bottom of the left corner select '''Add Tunnel → Add empty tunnel…'''<br>
 
[[File:Wireguard client create new empty tunnel v1.png|border|class=tlt-border]]<br>
 
*In the configuration window add these settings:
 
Address = 10.0.0.4/32
 
DNS = 8.8.8.8
 
 
[Peer]
 
PublicKey = Server’s public key
 
AllowedIPs = IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network.
 
Endpoint = Server’s IP with WireGuard port. In this example, client #3 is inside the server’s LAN network.
 
  
The configuration could look like this:<br>
+
<nowiki>----</nowiki>
[Interface]
 
PrivateKey = wireguard-private-key
 
Address = 10.0.0.4/24
 
DNS = 8.8.8.8
 
 
[Peer]
 
PublicKey = 2JIBoK+Bxe7MJzX9zV+lFjqHxLTvehLp3piEROaNJjw=
 
AllowedIPs = 10.0.0.0/24, 192.168.1.0/24, 192.168.6.0/24
 
Endpoint = 192.168.9.1:51820
 
  
'''Note:''' do not forget to press Activate to connect client #3 (WireGuard client software) to the server.
+
For this example you need:
  
===Server configuration===
+
<nowiki><ul></nowiki>
Now we will need to add peers to the server's WireGuard interface.
 
  
====Peer 1 configuration====
+
<nowiki><li>Three RUTOS devices</li></nowiki>
Follow the steps below to configure settings for client #1:
 
*Enter the peer’s '''name''' (for example, client1) and press '''Add'''
 
*Set the peer's '''Public Key'''. To find it go to the client #1 WireGuard interface's general settings. There you will find the public key
 
*In the '''Allowed IPs''' add IP addresses and networks you want to access. In this example, we will add client #1 WireGuard interface’s IP and its LAN network address
 
*Enable '''Route allowed IPs'''
 
*Press [[File:Save apply button.png]]
 
The configuration could look like this:<br>
 
[[File:Wireguard server to client peer v1.png|border|class=tlt-border]]
 
  
====Peer 2 configuration====
+
<nowiki><li>An end device to configure devices (PC, Laptop, Tablet or Smartphone) </li></nowiki>
For client #2 the steps are the same. Remember that the public key will be different and the allowed IPs list will slightly differ compared to the previous configuration.
 
  
====Peer 3 configuration====
+
<nowiki><li>One end device must have </nowiki>'''Public''' IP address<nowiki></li></nowiki>
Since client #3 is a PC running WireGuard inside the server’s LAN the configuration will slightly differ compared to the other clients. Follow these steps:
 
*Enter the peer’s '''name''' (for example, client3) and press '''Add'''
 
*Set the peer's '''Public Key'''. To find it go to the WireGuard software inside the PC. In the '''Interface section below''' the '''Status''' indicator, you will find the public key
 
*Set the '''Endpoint host''' to the server’s public IP
 
*In the '''Allowed IPs''' parameter add IP addresses and networks you want to access. In this example, we will only add the client's #3 WireGuard interface’s IP. We will not add its LAN network because client #3 is already inside the server’s LAN
 
*Enable '''Route allowed IPs'''
 
*Press [[File:Save apply button.png]]
 
The configuration could look like this:<br>
 
[[File:Wireguard server to PC client peer v1.png|border|class=tlt-border]]
 
  
The server interface's peers section could look like this:<br>
+
<nowiki><ul></nowiki>
[[File:Wireguard server to client all peers v2.png|border|class=tlt-border]]
 
  
==Additional Server configuration==
+
<nowiki>----</nowiki>
After completing the previous steps, now we will need to configure the server’s firewall to allow Peer-to-Peer communication. Follow these steps, to do that:
 
*Connect to the server’s WebUI
 
*Go to '''Network → Firewall → General settings'''
 
*Press '''Add''' to create a new zone
 
*Set '''input, output''', and '''forward''' to Accept
 
*Set '''Covered networks''' to the server’s WireGuard interface
 
*Set '''Allow forward to destination zones''' and '''Allow forward from source zones''' to WireGuard
 
*Press [[File:Save apply button.png]]
 
The configuration could look like this:<br>
 
[[File:Firewall_for_wireguard.png|border|class=tlt-border]]
 
  
==Testing the configuration==
+
<nowiki>==WireGuard Instances==</nowiki>
Once you have finished the configuration, you can test it by checking if all the peers performed a handshake and if they can reach each other in the VPN network.
 
===Checking for WireGuard handshakes===
 
Connect to the server’s CLI and type
 
wg show
 
You will see the interface's and its peers' information. In the peer information section look for the latest handshake (a line below allowed IPs). If you can see “latest handshake” it means the peer made a connection to the server.
 
This is an example of how the command’s output could look like:<br>
 
[[File:Teltonika Networks WG show output v3.png|border|class=tlt-border]]
 
  
'''Note:''' if you do not see the latest handshake line, then try pinging the server’s Public IP (the one specified in the Endpoint Host parameter) and/or server’s VPN IP (in this example it would be the 10.0.0.1) from each peer.
 
  
===Checking the connectivity between the peers===
+
To create Instance enter its name and click the <nowiki><b>Add</b></nowiki> button.  
Access client’s #3 (PC running WireGuard software) CLI. Then try to ping the client’s #1 and client’s #2 LAN networks. The test will be successful if you will see the same amount of transmitted and received packets.
 
This is an example of how successful pings could look like:
 
Pinging 192.168.1.1 with 32 bytes of data:
 
Reply from 192.168.1.1: bytes=32 time=119ms TTL=63
 
Reply from 192.168.1.1: bytes=32 time=127ms TTL=63
 
 
Ping statistics for 192.168.1.1:
 
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
 
Approximate round trip times in milli-seconds:
 
    Minimum = 119ms, Maximum = 127ms, Average = 123ms
 
 
Pinging 192.168.6.1 with 32 bytes of data:
 
Reply from 192.168.6.1: bytes=32 time=78ms TTL=63
 
Reply from 192.168.6.1: bytes=32 time=226ms TTL=63
 
 
Ping statistics for 192.168.6.1:
 
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
 
Approximate round trip times in milli-seconds:
 
    Minimum = 78ms, Maximum = 226ms, Average = 152ms
 
  
[[Category:VPN]]
+
Then click the <nowiki><b>Edit</b></nowiki> <nowiki>[[File:Networking_rutx_manual_edit_button_v1.png]]</nowiki> button to configure it.
 +
 
 +
<nowiki>[[File: Wireguard.png]]</nowiki>
 +
 
 +
<nowiki>[[File: Wireguard_Add.png]]</nowiki>

Revision as of 09:55, 5 September 2023

Main Page > General Information > Configuration Examples > VPN > Wireguard Peer To Peer Configuration example

==Introduction==


Introduction to a Peer-to-Peer WireGuard configuration example, this also covers LAN-TO-LAN connectivity aspect as well.

'''WireGuard''' is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.

This page will show you an example on how to configure a basic tunnel between WireGuard interface and its peers.

<u><b>Note:</b> WireGuard is additional software that can be installed from the <b>Services → Package Manager</b> page</u> (in RUT9/RUT2 this page is located in <b>System → Package Manager</b>).

==Prerequisites==


----

For this example you need:

<ul>

<li>Three RUTOS devices</li>

<li>An end device to configure devices (PC, Laptop, Tablet or Smartphone) </li>

<li>One end device must have Public IP address</li>

<ul>

----

==WireGuard Instances==


To create Instance enter its name and click the <b>Add</b> button.

Then click the <b>Edit</b> [[File:Networking_rutx_manual_edit_button_v1.png]] button to configure it.

[[File: Wireguard.png]]

[[File: Wireguard_Add.png]]