VPN > WireGuard > Endpoints > '+'
sign to add an endpointName:
give it a name to describe itPublic Key:
copy & paste the PublicKey string from the .conf fileAllowed IPs:
add 0.0.0.0/0 and ::/0Endpoint Address:
the Endpoint hostname from the .conf fileEndpoint port:
any from the range 51821 to 51900Keepalive:
30
VPN > WireGuard > Local > '+'
sign to add a local configuration and add the following:
Name:
anything to describe the configurationPrivate Key:
[copy & paste the private key from the .conf file]Listen port:
it's the local port, use the default 51820 or change it to otherMTU
(visible if the Advanced mode was checked): leave default or use 1420 if you face problems with some sites not loading or being very slowDNS Server
: 10.11.0.1Tunnel Address:
the 'Address' listed in the .conf file such as 10.11.x.y/16Peers:
select the peer created earlierDisable Routes:
uncheckedGateway:
leave blank
4. In the WireGuard General tab, Enable WireGuard
and Save
Now check in the List Configuration
tab if it established a handshake with the server and the transfer shows some bytes in and out. If yes, proceed forward.
Screenshot
5. Open Firewall > NAT > Outbound
and set Mode
to Hybrid outbound NAT rule generation
, Save and Apply changes
Screenshot+ Add
a new rule and set the following:
Interface
: WireGuardSource Address:
LAN NetTranslation / target:
Interface address
Save, Apply changes
Screenshot
6. For your LAN devices to work properly with the VPN connection, set static DNS servers in System > Settings > General
Prefer IPv4 over IPv6:
checkedDNS servers:
add the public DNS servers you want to use. We recommend 9.9.9.9 and 1.1.1.1
Important note: while the VPN is connected, all DNS queries would use our private DNS resolvers.
Allow DNS server list to be overridden by DHCP/PPP on WAN:
uncheckedDo not use the local DNS service as a nameserver for this sytem:
checked
Screenshot
Now go to VPN > WireGuard
and re-enable it by re-checking the Enable WireGuard
checkbox and Save. (disable it once, enable it back to force a restart)