What exact package are you looking for? Because wireguard doesn't exist anymore. The two packages you do need (kmod-wireguard and wireguard-tools) both appear to be in the repository, as do the relevant luci packages (if you want luci support).
Oh I had no idea I needed omv-extras, now I just installed it and I was able to install the wireguard service, is it better to use this add-on for a small office or better to install it manually from console by apt install wireguard? is it the same?
In any case it's just a GUI problem. I have checked the configuration file of that new client in /etc/wireguard and the DNS parameter is correctly configured, as it appears when pressing the Client Config button in the GUI. So it's just a display problem, not a function problem.
When using dig, make sure to set the resolver to the DNS value set in your wireguard config file. it looks like you might be using the DNS server (fdaa:0:18::3) from the Fly documentation, which is probably not (but could be!) the dns server set in your wireguard configuration.
In Fedora 37 I was able to have systemctl automatically enable my wireguard interface by simply putting a valid wg0.conf file in /etc/wireguard/ and then running sudo systemctl enable wg-q...@wg0.service
The client just remains at idle, says its connected to the internet server, but there is no connection on the server status side. Is this because Urbackup cannot find a path back to the client over the VPN? is there some routing I need to do on my end above and beyond the standard wireguard routing that has worked up until this point?
I followed these instructions: -to-set-up-wireguard-on-pfsense/ Opens a new window. I am still not able to connect to my wireguard server running on my pfsense box. I am running pfsense v2.6.0 CE. Wireguard installed package version is 0.1.6_2. I am trying to connect from my android phone using the Wireguard app.
@schumaku , Yeah, I spotted that later that day.. My primary request is for wireguard. I've got a Raspberry Pi running OpenWRT as a poor man's VPN gateway. Got wireguard working on it and the increase in throughput is quite impressive. Currently the only one using it is myself (at home) but I'd like to move 3 other users (family) to that tunnel, but the Pi isn't really meant to handle that kind of processing.. Speeds drop off pretty quickly when the wife starts playing WOW and the kids start streaming video at the same time. So I'm hoping I can offload the VPN to the router, where it should be. It's that, I buy something with more computational power and two dedicated gig interfaces.
I appreciate the heads up on OpenVPN, since I probably muddled the waters by including that reference, but if I can get wireguard on the router I can move the Pi to something that won't get me gripes from the fam...(lol)
If you open a case @ fortinet TAC support in the meantime it can helpFortinet generally do not give support on design for projects in delivery, so to open a case like this one, it can be a good idea to ask support on the chat (like : How to configure a wireguard VPN on my FortiGate ?). The level 0 operator of the chat will not know and he will propose you to open a case at next TAC support level for a senior engenieer to answer.
760c119bf3