VPN > WireGuard > Endpoints > '+' sign to add an endpointName: give it a name to describe itPublic Key: copy & paste the PublicKey string from the .conf fileAllowed IPs: add 0.0.0.0/0 and ::/0Endpoint Address: the Endpoint hostname from the .conf fileEndpoint port: any from the range 51821 to 51900Keepalive: 30
VPN > WireGuard > Local > '+' sign to add a local configuration and add the following:
Name: anything to describe the configurationPrivate Key: [copy & paste the private key from the .conf file]Listen port: it's the local port, use the default 51820 or change it to otherMTU (visible if the Advanced mode was checked): leave default or use 1420 if you face problems with some sites not loading or being very slowDNS Server: 10.11.0.1Tunnel Address: the 'Address' listed in the .conf file such as 10.11.x.y/16Peers: select the peer created earlierDisable Routes: uncheckedGateway: leave blank
4. In the WireGuard General tab, Enable WireGuard and Save
Now check in the List Configuration tab if it established a handshake with the server and the transfer shows some bytes in and out. If yes, proceed forward.
Screenshot
5. Open Firewall > NAT > Outbound and set Mode to Hybrid outbound NAT rule generation, Save and Apply changes
Screenshot+ Add a new rule and set the following:
Interface: WireGuardSource Address: LAN NetTranslation / target: Interface address
Save, Apply changes
Screenshot
6. For your LAN devices to work properly with the VPN connection, set static DNS servers in System > Settings > General Prefer IPv4 over IPv6: checkedDNS servers: add the public DNS servers you want to use. We recommend 9.9.9.9 and 1.1.1.1
Important note: while the VPN is connected, all DNS queries would use our private DNS resolvers.
Allow DNS server list to be overridden by DHCP/PPP on WAN: uncheckedDo not use the local DNS service as a nameserver for this sytem: checked
Screenshot
Now go to VPN > WireGuard and re-enable it by re-checking the Enable WireGuard checkbox and Save. (disable it once, enable it back to force a restart)