Wireguard Peer To Peer Configuration example: Difference between revisions

From Teltonika Networks Wiki
No edit summary
mNo edit summary
 
(19 intermediate revisions by 3 users not shown)
Line 1: Line 1:
<nowiki>==Introduction==</nowiki>
==Introduction==
WireGuard is a simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography. This example covers Peer-to-Peer configuration and LAN-to-LAN connectivity using WireGuard VPN.<br><br>
'''Note:''' If you do not see WireGuard in '''Services → VPN'''. Go to '''System → Package Manager → Packages''' page and install it from there.


==Prerequisites==
For this example, you will need:
*Three RUTOS devices with different LAN networks
*One RUTOS device will need to have a '''Public IP''' address
*An end device with the ability to install, set up WireGuard client, and configure RUTOS devices<br>
'''Note:''' remember to switch the '''WebUI''' into '''Advanced''' mode.


Introduction to a Peer-to-Peer WireGuard configuration example, this also covers LAN-TO-LAN connectivity aspect as well.
==Topology used in this example==
[[File:Wireguard peer to peer config example topology v3.png|border|class=tlt-border]]


<nowiki>'''WireGuard'''</nowiki> is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.
==WireGuard instance creation==
To create a WireGuard interface follow these steps:
*Connect to WebUI
*Go to '''Services → VPN → Wireguard'''
*Enter the interface '''name''' and press '''Add'''
[[File:Add_wireguard_instance.png|border|class=tlt-border]]


This page will show you an example on how to configure a basic tunnel between WireGuard interface and its peers.
== WireGuard instance general configuration==
In this example, each interface’s general settings will be similar for all RUTOS devices. The difference will be in the assigned IP address. To set up the general configuration, follow these steps:
*When you have pressed [[File:Networking_rutx_manual_edit_button_v1.png]] near the WireGuard interface, go to the '''General Setup''' section
*'''Enable''' the interface
*Press [[File:Networking_rutx_manual_generate_button_v1.png]]
*Take note of the interface’s public key
*Set an IP address. For the '''server''' set '''10.0.0.1/24'''. For the '''clients''' set the IP to '''10.0.0.2/24 and higher'''. For example, client #1 – IP 10.0.0.2/24, client #2 – IP 10.0.0.3/24, and so on
Below is an example of the server’s WireGuard interface:<br>
[[File:Wireguard server interface config example v1.png|border|class=tlt-border]]


<nowiki><u><b>Note:</b></nowiki> WireGuard is additional software that can be installed from the <nowiki><b>Services → Package Manager</b></nowiki> page<nowiki></u></nowiki> (in RUT9/RUT2 this page is located in <nowiki><b>System → Package Manager</b></nowiki>).
==Peers Configuration==
Next, we will add WireGuard peers. Go to each device's WireGuard interface and go to the Peers section (below the interface’s general/advanced settings).
===Client 1 configuration===
To create client #1 to server/peer configuration, follow these steps:
*Enter the instance '''name''' (for example, server) and press '''Add'''
*As '''Public Key''' set the server’s public key. To find it go to the server’s WireGuard interface settings. There you will find the public key
*As '''Endpoint host''' set the server’s public IP
*In the '''Allowed IPs''' add IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network
*Additionally, you can write the peer’s description
*Enable '''Route allowed IPs'''
*Press [[File:Save apply button.png]]
The configuration could look like this:<br>
[[File:Wireguard client1 to server peer v2.png|border|class=tlt-border]]


<nowiki>==Prerequisites==</nowiki>
===Client 2 configuration===
To create client #2 to server/peer configuration, follow these steps:
*Enter the instance '''name''' (for example, server) and press '''Add'''
*As '''Public Key''' set the server’s public key. To find it go to the server’s WireGuard interface settings. There you will find the public key
*As '''Endpoint host''' set the server’s public IP
*In the '''Allowed IPs''' add IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network
*Additionally, you can write the peer’s description
*Enable '''Route allowed IPs'''
*Press [[File:Save apply button.png]]
The configuration could look like this:<br>
[[File:Wireguard client2 to server peer v2.png|border|class=tlt-border]]


===Client 3 configuration===
Firstly, ensure that you have downloaded and installed WireGuard client ([https://www.wireguard.com/install/ wireguard.com/install]) for your PC. To create client #3 to server/peer configuration, follow these steps:
*Launch the WireGuard software
*At the bottom of the left corner select '''Add Tunnel → Add empty tunnel…'''<br>
[[File:Wireguard client create new empty tunnel v1.png|border|class=tlt-border]]<br>
*In the configuration window add these settings:
Address = 10.0.0.4/32
DNS = 8.8.8.8
[Peer]
PublicKey = Server’s public key
AllowedIPs = IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network.
Endpoint = Server’s IP with WireGuard port. In this example, client #3 is inside the server’s LAN network.


<nowiki>----</nowiki>
The configuration could look like this:<br>
[Interface]
PrivateKey = wireguard-private-key
Address = 10.0.0.4/24
DNS = 8.8.8.8
[Peer]
PublicKey = 2JIBoK+Bxe7MJzX9zV+lFjqHxLTvehLp3piEROaNJjw=
AllowedIPs = 10.0.0.0/24, 192.168.1.0/24, 192.168.6.0/24
Endpoint = 192.168.9.1:51820


For this example you need:
'''Note:''' do not forget to press Activate to connect client #3 (WireGuard client software) to the server.


<nowiki><ul></nowiki>
===Server configuration===
Now we will need to add peers to the server's WireGuard interface.


<nowiki><li>Three RUTOS devices</li></nowiki>
====Peer 1 configuration====
Follow the steps below to configure settings for client #1:
*Enter the peer’s '''name''' (for example, client1) and press '''Add'''
*Set the peer's '''Public Key'''. To find it go to the client #1 WireGuard interface's general settings. There you will find the public key
*In the '''Allowed IPs''' add IP addresses and networks you want to access. In this example, we will add client #1 WireGuard interface’s IP and its LAN network address
*Enable '''Route allowed IPs'''
*Press [[File:Save apply button.png]]
The configuration could look like this:<br>
[[File:Wireguard server to client peer v1.png|border|class=tlt-border]]


<nowiki><li>An end device to configure devices (PC, Laptop, Tablet or Smartphone) </li></nowiki>
====Peer 2 configuration====
For client #2 the steps are the same. Remember that the public key will be different and the allowed IPs list will slightly differ compared to the previous configuration.


<nowiki><li>One end device must have </nowiki>'''Public''' IP address<nowiki></li></nowiki>
====Peer 3 configuration====
Since client #3 is a PC running WireGuard inside the server’s LAN the configuration will slightly differ compared to the other clients. Follow these steps:
*Enter the peer’s '''name''' (for example, client3) and press '''Add'''
*Set the peer's '''Public Key'''. To find it go to the WireGuard software inside the PC. In the '''Interface section below''' the '''Status''' indicator, you will find the public key
*Set the '''Endpoint host''' to the server’s public IP
*In the '''Allowed IPs''' parameter add IP addresses and networks you want to access. In this example, we will only add the client's #3 WireGuard interface’s IP. We will not add its LAN network because client #3 is already inside the server’s LAN
*Enable '''Route allowed IPs'''
*Press [[File:Save apply button.png]]
The configuration could look like this:<br>
[[File:Wireguard server to PC client peer v1.png|border|class=tlt-border]]


<nowiki><ul></nowiki>
The server interface's peers section could look like this:<br>
[[File:Wireguard server to client all peers v2.png|border|class=tlt-border]]


<nowiki>----</nowiki>
==Additional Server configuration==
After completing the previous steps, now we will need to configure the server’s firewall to allow Peer-to-Peer communication. Follow these steps, to do that:
*Connect to the server’s WebUI
*Go to '''Network → Firewall → General settings'''
*Press '''Add''' to create a new zone
*Set '''input, output''', and '''forward''' to Accept
*Set '''Covered networks''' to the server’s WireGuard interface
*Set '''Allow forward to destination zones''' and '''Allow forward from source zones''' to WireGuard
*Press [[File:Save apply button.png]]
The configuration could look like this:<br>
[[File:Firewall_for_wireguard.png|border|class=tlt-border]]


<nowiki>==WireGuard Instances==</nowiki>
==Testing the configuration==
Once you have finished the configuration, you can test it by checking if all the peers performed a handshake and if they can reach each other in the VPN network.
===Checking for WireGuard handshakes===
Connect to the server’s CLI and type
wg show
You will see the interface's and its peers' information. In the peer information section look for the latest handshake (a line below allowed IPs). If you can see “latest handshake” it means the peer made a connection to the server.
This is an example of how the command’s output could look like:<br>
[[File:Teltonika Networks WG show output v3.png|border|class=tlt-border]]


'''Note:''' if you do not see the latest handshake line, then try pinging the server’s Public IP (the one specified in the Endpoint Host parameter) and/or server’s VPN IP (in this example it would be the 10.0.0.1) from each peer.


To create Instance enter its name and click the <nowiki><b>Add</b></nowiki> button.  
===Checking the connectivity between the peers===
Access client’s #3 (PC running WireGuard software) CLI. Then try to ping the client’s #1 and client’s #2 LAN networks. The test will be successful if you will see the same amount of transmitted and received packets.
This is an example of how successful pings could look like:
Pinging 192.168.1.1 with 32 bytes of data:
Reply from 192.168.1.1: bytes=32 time=119ms TTL=63
Reply from 192.168.1.1: bytes=32 time=127ms TTL=63
Ping statistics for 192.168.1.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 119ms, Maximum = 127ms, Average = 123ms
Pinging 192.168.6.1 with 32 bytes of data:
Reply from 192.168.6.1: bytes=32 time=78ms TTL=63
Reply from 192.168.6.1: bytes=32 time=226ms TTL=63
Ping statistics for 192.168.6.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 78ms, Maximum = 226ms, Average = 152ms


Then click the <nowiki><b>Edit</b></nowiki> <nowiki>[[File:Networking_rutx_manual_edit_button_v1.png]]</nowiki> button to configure it.
[[Category:VPN]]
 
<nowiki>[[File: Wireguard.png]]</nowiki>
 
<nowiki>[[File: Wireguard_Add.png]]</nowiki>
 
 
<nowiki>==Server Configuration==</nowiki>
 
<nowiki>===Peer to Peer Setup===</nowiki>
 
The following part of example applies to both devices.
 
Before editing any fields click <nowiki>[[File:Networking_rutx_manual_generate_button_v1.png]]</nowiki> button to generate Public and Private keys.
 
After that you need to Enable this instance and in the '''<nowiki><b>Listen Port</b></nowiki>''' field enter your desired port. WireGuard by default uses '''<nowiki><b>51820</b></nowiki>''' port which will be used in this example.
 
Lastly you need to enter IP Address for instance. We will set the SERVER will have 10.0.0.1 and Clients will have 10.0.0.2 IP addresses and increasing.
 
'''<nowiki><b>Note:</b></nowiki>''' enter IP address '''<nowiki><b>and</b></nowiki>''' its mask e.g. '''<nowiki><b>10.0.0.1/24</b></nowiki>'''
 
'''<nowiki><b>Note:</b></nowiki>''' You will need to copy the Public and Private Keys for Peer instances between server and Clients
 
<nowiki><ul></nowiki>
 
<nowiki><li>Please ensure that you save the Public key for later use</li></nowiki>
 
<nowiki><li>Enter the IP address of the WireGuard Interface on the server (e.g. 10.0.0.1/24) </li></nowiki>
 
<nowiki><ul></nowiki>
 
 
<nowiki>[[File:WireGuard_Server.png]]</nowiki>
 
<nowiki>==Peers Configuration==</nowiki>
=== ==Peer to Peer Setup== ===
In the <nowiki><b></nowiki>'''General Setup<nowiki><b></nowiki>''' section you need to enter '''Public Key''' and '''Allowed IPs''' from the Remote instance you want to connect to.
 
In this example a peer from Client1 needs to connect to RUTX11, which means '''SERVER''' will enter Public Key and Allowed IPs from Client1.
 
You will need the Public Keys of the Client VPN users that you setup, so it is recommended to create the Instances to Generate the Keys for use of Peer instances
 
=== ==Peers Configuration Client 1== ===
Client 1 is setup with the following details, WireGuard Interface IP is set as 10.0.0.2 with a LAN range of 192.168.5.0/24
 
You will need to create a new WireGuard instance and Peer connection, please ensure you copy the public Key that was generated via the creation of the instance, as this will be used on the Server side for the VPN.
 
<nowiki><ul></nowiki>
 
<nowiki><li>Copy the Public Key and save it in a text file for later use, as it will be used on the Server Peer configuration</li></nowiki>
 
<nowiki><li>Enter the IP address of the WireGuard interface e.g. 10.0.0.2/24</li></nowiki>
 
<nowiki><li>Now we will Create a Peer connection</li></nowiki>
 
<nowiki><li>Point 1 is the Server’s Public Key that was acquired when creating the instance on the Server/Main router side</li></nowiki>
 
<nowiki><li>Allowed IPs are the IP ranges you want to have access to over the VPN (the remote side) </li></nowiki>
 
<nowiki><li>Please ensure you enable “Route allowed IPs” </li></nowiki>
 
<nowiki><li>Under “Advanced Settings” please ensure you enter the Server side Public IP address</li></nowiki>
 
<nowiki><li>Save and Apply the settings</li></nowiki>
 
<nowiki><ul></nowiki>
 
<nowiki>[[File:WireGuard_Client1.png]]</nowiki>
 
<nowiki>[[File:WireGuard_Client1_IP_list.png]]</nowiki>
 
<nowiki>[[File:WireGuard_Client1_HostEnd.png]]</nowiki>
=== ==Peers Configuration Client 2== ===
Client 2 is setup with the following details, WireGuard Interface IP is set as 10.0.0.3 with a LAN range of 192.168.10.0/24
 
You will need to create a new WireGuard instance and Peer connection, please ensure you copy the public Key that was generated via the creation of the instance, as this will be used on the Server side for the VPN.
 
<nowiki><ul></nowiki>
 
<nowiki><li>Copy the Public Key and save it in a text file for later use, as it will be used on the Server Peer configuration</li></nowiki>
 
<nowiki><li>Enter the IP address of the WireGuard interface e.g. 10.0.0.3/24</li></nowiki>
 
<nowiki><li>Now we will Create a Peer connection</li></nowiki>
 
<nowiki><li>Point 1 is the Server’s Public Key that was acquired when creating the instance on the Server/Main router side</li></nowiki>
 
<nowiki><li>Allowed IPs are the IP ranges you want to have access to over the VPN (the remote side) </li></nowiki>
 
<nowiki><li>Please ensure you enable “Route allowed IPs” </li></nowiki>
 
<nowiki><li>Under “Advanced Settings” please ensure you enter the Server side Public IP address</li></nowiki>
 
<nowiki><li>Save and Apply the settings</li></nowiki>
 
<nowiki><ul></nowiki>
 
<nowiki>[[File:WireGuard_Client2.png]]</nowiki>
 
<nowiki>[[File:WireGuard_Client2_IP_list.png]]</nowiki>
 
<nowiki>[[File:WireGuard_Client2_HostEnd.png]]</nowiki>
=== ==Peers Configuration Client 3== ===
Please ensure you download WireGuard for your PC (Windows Client)
 
Installation: <nowiki>https://www.wireguard.com/install/</nowiki>
 
Once you have created a new Tunnel, you will need to add the below lines of code to finish the VPN setup,
 
<nowiki><ul></nowiki>
 
<nowiki><li>Address = 10.0.0.4/24</li></nowiki>
 
<nowiki><li>DNS = 8.8.8.8</li></nowiki>
 
<nowiki><li> [Peer] </li></nowiki>
 
<nowiki><li>PublicKey = Which will be the Server’s Public Key</li></nowiki>
 
<nowiki><li>AllowedIPs = IP ranges you want access to (Remote side) </li></nowiki>
 
<nowiki><li>EndPoint = Server’s IP (our instance was 192.168.1.1 as it was part of the LAN) </li></nowiki>
 
<nowiki><ul></nowiki>
 
<nowiki>[[File:WireGuard_PC_Client.png]]</nowiki>
 
=== ==Peers Configuration Server== ===
 
=== ==Server to Peer Setup== ===
In the <nowiki><b></nowiki>'''General Setup'''<nowiki><b> section you need to enter <b></nowiki>'''Public Key'''<nowiki><b> and <b></nowiki>'''Allowed IPs'''<nowiki><b> from the Remote instance you want to connect to.</nowiki>
 
We will be creating 3 instances, these will be the remote Peers we created above and will make use of their Public Keys to create them, such as below
 
<nowiki>[[File:WireGuard_Server_Clients.png]]</nowiki>
 
=== ==Server To Client 1== ===
Create your 1<sup>st</sup> client peer under the server
 
<nowiki><ul></nowiki>
 
<nowiki><li>Enter the Public Key you created for Client 1</li></nowiki>
 
<nowiki><li>Enter in the IP address you want to access on Client 1 side(LAN side and WireGuard Interface IP) </li></nowiki>
 
<nowiki><li>Ensure you have enabled “Route allowed IPs” </li></nowiki>
 
<nowiki><ul></nowiki>
 
<nowiki>[[File:WireGuard_Server_Client1.png]]</nowiki>
 
=== ==Server To Client 2== ===
Create your 2<sup>nd</sup> client peer under the server
 
<nowiki><ul></nowiki>
 
<nowiki><li>Enter the Public Key you created for Client 2</li></nowiki>
 
<nowiki><li>Enter in the IP address you want to access on Client 2 side(LAN side and WireGuard Interface IP) </li></nowiki>
 
<nowiki><li>Ensure you have enabled “Route allowed IPs” </li></nowiki>
 
<nowiki><ul></nowiki>
 
<nowiki>[[File:WireGuard_Server_Client2.png]]</nowiki>
=== ==Server To Client 3 (PC)== ===
Create your 3<sup>rd</sup> client peer under the server
 
<nowiki><ul></nowiki>
 
<nowiki><li>Enter the Public Key you created for Client 2</li></nowiki>
 
<nowiki><li>Enter in the IP address you want to access on Client 3 side(LAN side and WireGuard Interface IP) </li></nowiki>
 
<nowiki><li>Ensure you have enabled “Route allowed IPs” </li></nowiki>
 
<nowiki><ul></nowiki>
 
<nowiki>[[File:WireGuard_Server_Client3.png]]</nowiki> 
 
=== ==Testing the Setup== ===
 
=== ===Testing=== ===
Once you have setup the WireGuard Server and Peer settings, you can test by making use of the below
 
Please ensure that on the Server side, that you allow the Firewall to accept traffic going through the Server router for Peer-to-Peer traffic to flow
 
This can be located in Network -> Firewall -> General settings
 
A zone for WireGuard to WireGuard can be created as below to ensure traffic is not restricted from the server
 
<nowiki>[[File:WireGuard_Firewall_Rules.png]]</nowiki>
 
Once you have created your Peers and Host, via the CLI you will be able to see the new WireGuard interfaces and ping across the new VPN, below is an example
 
Show peers and uptime of WireGuard instances with use of “wg” command in the CLI
 
<nowiki>[[File:WireGuard_Test_interface_Server.png]]</nowiki>
 
Ping LAN to LAN
 
<nowiki>[[File:WireGuard_Server_Test.png]]</nowiki>
 
Ping PC Client to Client 1
 
<nowiki>[[File:Client_to_Client_Test.png]]</nowiki>

Latest revision as of 08:29, 15 January 2024

Main Page > General Information > Configuration Examples > VPN > Wireguard Peer To Peer Configuration example

Introduction

WireGuard is a simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography. This example covers Peer-to-Peer configuration and LAN-to-LAN connectivity using WireGuard VPN.

Note: If you do not see WireGuard in Services → VPN. Go to System → Package Manager → Packages page and install it from there.

Prerequisites

For this example, you will need:

  • Three RUTOS devices with different LAN networks
  • One RUTOS device will need to have a Public IP address
  • An end device with the ability to install, set up WireGuard client, and configure RUTOS devices

Note: remember to switch the WebUI into Advanced mode.

Topology used in this example

WireGuard instance creation

To create a WireGuard interface follow these steps:

  • Connect to WebUI
  • Go to Services → VPN → Wireguard
  • Enter the interface name and press Add

WireGuard instance general configuration

In this example, each interface’s general settings will be similar for all RUTOS devices. The difference will be in the assigned IP address. To set up the general configuration, follow these steps:

  • When you have pressed near the WireGuard interface, go to the General Setup section
  • Enable the interface
  • Press
  • Take note of the interface’s public key
  • Set an IP address. For the server set 10.0.0.1/24. For the clients set the IP to 10.0.0.2/24 and higher. For example, client #1 – IP 10.0.0.2/24, client #2 – IP 10.0.0.3/24, and so on

Below is an example of the server’s WireGuard interface:

Peers Configuration

Next, we will add WireGuard peers. Go to each device's WireGuard interface and go to the Peers section (below the interface’s general/advanced settings).

Client 1 configuration

To create client #1 to server/peer configuration, follow these steps:

  • Enter the instance name (for example, server) and press Add
  • As Public Key set the server’s public key. To find it go to the server’s WireGuard interface settings. There you will find the public key
  • As Endpoint host set the server’s public IP
  • In the Allowed IPs add IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network
  • Additionally, you can write the peer’s description
  • Enable Route allowed IPs
  • Press

The configuration could look like this:

Client 2 configuration

To create client #2 to server/peer configuration, follow these steps:

  • Enter the instance name (for example, server) and press Add
  • As Public Key set the server’s public key. To find it go to the server’s WireGuard interface settings. There you will find the public key
  • As Endpoint host set the server’s public IP
  • In the Allowed IPs add IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network
  • Additionally, you can write the peer’s description
  • Enable Route allowed IPs
  • Press

The configuration could look like this:

Client 3 configuration

Firstly, ensure that you have downloaded and installed WireGuard client (wireguard.com/install) for your PC. To create client #3 to server/peer configuration, follow these steps:

  • Launch the WireGuard software
  • At the bottom of the left corner select Add Tunnel → Add empty tunnel…


  • In the configuration window add these settings:
Address = 10.0.0.4/32
DNS = 8.8.8.8

[Peer]
PublicKey = Server’s public key
AllowedIPs = IP addresses and networks you want to access. In this example, we will add the VPN network and each peer’s LAN network.
Endpoint = Server’s IP with WireGuard port. In this example, client #3 is inside the server’s LAN network. 

The configuration could look like this:

[Interface]
PrivateKey = wireguard-private-key
Address = 10.0.0.4/24
DNS = 8.8.8.8

[Peer]
PublicKey = 2JIBoK+Bxe7MJzX9zV+lFjqHxLTvehLp3piEROaNJjw=
AllowedIPs = 10.0.0.0/24, 192.168.1.0/24, 192.168.6.0/24
Endpoint = 192.168.9.1:51820

Note: do not forget to press Activate to connect client #3 (WireGuard client software) to the server.

Server configuration

Now we will need to add peers to the server's WireGuard interface.

Peer 1 configuration

Follow the steps below to configure settings for client #1:

  • Enter the peer’s name (for example, client1) and press Add
  • Set the peer's Public Key. To find it go to the client #1 WireGuard interface's general settings. There you will find the public key
  • In the Allowed IPs add IP addresses and networks you want to access. In this example, we will add client #1 WireGuard interface’s IP and its LAN network address
  • Enable Route allowed IPs
  • Press

The configuration could look like this:

Peer 2 configuration

For client #2 the steps are the same. Remember that the public key will be different and the allowed IPs list will slightly differ compared to the previous configuration.

Peer 3 configuration

Since client #3 is a PC running WireGuard inside the server’s LAN the configuration will slightly differ compared to the other clients. Follow these steps:

  • Enter the peer’s name (for example, client3) and press Add
  • Set the peer's Public Key. To find it go to the WireGuard software inside the PC. In the Interface section below the Status indicator, you will find the public key
  • Set the Endpoint host to the server’s public IP
  • In the Allowed IPs parameter add IP addresses and networks you want to access. In this example, we will only add the client's #3 WireGuard interface’s IP. We will not add its LAN network because client #3 is already inside the server’s LAN
  • Enable Route allowed IPs
  • Press

The configuration could look like this:

The server interface's peers section could look like this:

Additional Server configuration

After completing the previous steps, now we will need to configure the server’s firewall to allow Peer-to-Peer communication. Follow these steps, to do that:

  • Connect to the server’s WebUI
  • Go to Network → Firewall → General settings
  • Press Add to create a new zone
  • Set input, output, and forward to Accept
  • Set Covered networks to the server’s WireGuard interface
  • Set Allow forward to destination zones and Allow forward from source zones to WireGuard
  • Press

The configuration could look like this:

Testing the configuration

Once you have finished the configuration, you can test it by checking if all the peers performed a handshake and if they can reach each other in the VPN network.

Checking for WireGuard handshakes

Connect to the server’s CLI and type

wg show 

You will see the interface's and its peers' information. In the peer information section look for the latest handshake (a line below allowed IPs). If you can see “latest handshake” it means the peer made a connection to the server. This is an example of how the command’s output could look like:

Note: if you do not see the latest handshake line, then try pinging the server’s Public IP (the one specified in the Endpoint Host parameter) and/or server’s VPN IP (in this example it would be the 10.0.0.1) from each peer.

Checking the connectivity between the peers

Access client’s #3 (PC running WireGuard software) CLI. Then try to ping the client’s #1 and client’s #2 LAN networks. The test will be successful if you will see the same amount of transmitted and received packets. This is an example of how successful pings could look like:

Pinging 192.168.1.1 with 32 bytes of data:
Reply from 192.168.1.1: bytes=32 time=119ms TTL=63
Reply from 192.168.1.1: bytes=32 time=127ms TTL=63

Ping statistics for 192.168.1.1:
   Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
   Minimum = 119ms, Maximum = 127ms, Average = 123ms

Pinging 192.168.6.1 with 32 bytes of data:
Reply from 192.168.6.1: bytes=32 time=78ms TTL=63
Reply from 192.168.6.1: bytes=32 time=226ms TTL=63

Ping statistics for 192.168.6.1:
   Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
   Minimum = 78ms, Maximum = 226ms, Average = 152ms