Это видео недоступно.
Сожалеем об этом.

COMPLETE WireGuard on PFsense 2.7 Setup - Covering Windows, Mac, & Mobile + DuckDNS & Firewall 2024

Поделиться
HTML-код
  • Опубликовано: 15 авг 2024
  • Unlock the full potential of secure and high-speed VPN connections with our comprehensive guide to setting up WireGuard on PFsense 2.7, tailored for 2024. In this detailed tutorial, we delve into configuring WireGuard on the latest version of PFsense, ensuring you can establish a robust VPN connection regardless of your device. Whether you're using Windows, macOS, Linux, or Android, we've got you covered with step-by-step instructions that make the setup process seamless and straightforward.
    Not only do we guide you through the initial setup, but we also provide essential tips on configuring firewall rules to enhance security and ensure optimal performance. From understanding the basics of WireGuard and PFsense to advanced configuration techniques, this video is your all-encompassing resource for creating a secure, efficient VPN network.
    Perfect for both beginners and seasoned professionals, our tutorial is designed to empower you with the knowledge and skills to leverage WireGuard on PFsense 2.7 effectively. By the end of this video, you'll have a fully functional VPN setup, complete with robust security measures, ready to protect your online activities across multiple platforms. Don't miss out on these valuable insights and tips-start enhancing your network's security and performance today!
    Transform your home network with pfSense - • Transform Your Home Ne...
    #pfsense #wireguard #tutorial
    0:00 Intro
    1:43 Wireguard Server
    3:30 Firewall Rules
    5:33 Wireguard client (Desktop)
    11:20 Duck DNS Setup
    12:32 Wireguard on Mobile
    14:47 Outro

Комментарии • 52

  • @thetradingclassroom
    @thetradingclassroom 4 месяца назад +6

    We are very fortunate as viewers to have this info taught so clearly and concisely, for free! Thanks so much

  • @3doh
    @3doh 12 дней назад

    You're the guy. These are the kind of tutorials I like. Detailed and straight to the point. I'll keep coming to your channel. Liked and subscribed. I never activate the notifications bell but I am making an exception here. Great job!

  • @donaldhiggs2075
    @donaldhiggs2075 Месяц назад

    Found you like a week ago and love the content. You make it easy to learn.

  • @volsfan8032
    @volsfan8032 2 месяца назад

    Great Video! Straight to the point, easy to understand and not dragging the information out just for a longer video with confusing instructions like many others I saw when trying to get this to work, Your directions were spot on! Thank You very much!! I have see a few other of your videos and you just got a new sub! Keep up the good work!

  • @powerarc999
    @powerarc999 3 месяца назад +1

    Clear and working instructions. I got my WG running on the first pass of configuration. Bravo.

  • @gkj7762
    @gkj7762 3 месяца назад

    Thanks it worked!! I followed "L systems" tutorial last night on this and I got flabbergasted by the speed and rapid clicks, your tutorial is clean and simple to follow! 😊

  • @TheDropForged
    @TheDropForged 5 месяцев назад +3

    I love your videos. I have been following you since your first pfsense video.

  • @amansync
    @amansync 5 месяцев назад

    Another goldmine of a video! Absolutely loved the content, it's so engaging and informative. Keep up the fantastic work, can't wait to see more from your channel, mate! ❤

  • @pjba6064
    @pjba6064 2 месяца назад

    this is very informative and the topic was discussed smoothly

  • @alnahian8435
    @alnahian8435 4 месяца назад +1

    This is just awesome! I have been looking for this for sometime and couldn't find a good site to follow- thanks a lot for this- please make a detail video on pfsenseNG, as well as make a short video on building an enterprise environment in Azure using pfsense as FW and VMs behind it. Thanks a lot! Keep making good videos!!!

    • @DigitalMirrorComputing
      @DigitalMirrorComputing  4 месяца назад

      thanks for the support and feedback mate! I've taken note of your suggestions which are great btw!!

  • @KLNYC
    @KLNYC 4 месяца назад

    I just started for PFsense a week ago. thx for the vid bro

  • @ValienteAguila
    @ValienteAguila 29 дней назад

    Great Video! Got my Wireguard running with it on my pfsense. But your Video lacks one important configuration step. If someone (like me) wants to redirect all internet-traffic of the mobile devices, like a phone or notebook, over the pfsense, it is not only mandatory to set allowed IP-Adresses on mobile devices configuration file to 0.0.0.0/0 but also to define in pfsense on "Firewall / NAT / Outbound" a "Mappings"-Rule for the Source IP's of the Wireguard-Net and set the "Outbound NAT Mode" to "Hybrid Outbound NAT rule generation.(Automatic Outbound NAT + rules below)".Otherwise the traffic of the mobile devces wont be forwarded to the internet and its impssube to get any internetaccess during WIreguard-connection is established.

  • @eidodoos
    @eidodoos Месяц назад

    very good tutorial. tyvm. keep it up

  • @ciasatellite2549
    @ciasatellite2549 3 месяца назад +2

    Thanks, Its working on split tunnel, but NOT Working on full tunnel. I use AllowedIPs=0.0.0.0/0

    • @francois584
      @francois584 Месяц назад

      You need to add a NAT rule

    • @larrydaponte3203
      @larrydaponte3203 Месяц назад

      @@francois584 You rock! Thanks for posting this hint!

  • @tesla2115
    @tesla2115 4 месяца назад

    Thanks it worked!

  • @Gaming-Overlord
    @Gaming-Overlord 5 месяцев назад +4

    Nice video tutorial! Personally I hate wireguard. Speeds are great however the fact you need to generate keys for every client/device sucks. Openvpn is great to set and forget at the router. You shouldn't have to go through all this trouble for every device connected to your router it defeats the purpose of having a VPN router

    • @DigitalMirrorComputing
      @DigitalMirrorComputing  5 месяцев назад

      That's a very fair point! It can be a pain in the ass to grant and revoke keys all the bloody time! Also I believe you can integrate OpenVPN with ADFS and manage authentication that way! For my home lab (and given I am the only user as the missus is alergic to computers) is good enough! :D Thanks for watching! :)

    • @nokarukuta587
      @nokarukuta587 3 месяца назад

      Tailscale is a thing, but the initial authantication goes through them so technically not as secure

  • @alaweeee1
    @alaweeee1 3 месяца назад

    Awesome, here is a challenge. How about you configure WireG to operate with dynamic peers? I couldn't find any resource about that

  • @kristof9497
    @kristof9497 5 месяцев назад

    Thanks.

  • @tokoiaoben3842
    @tokoiaoben3842 5 месяцев назад

    Thanks I love your video. I have cgnat connection, can wireguard overcome this ?

  • @HendrikHanf
    @HendrikHanf 2 месяца назад

    On my system 2.7.2 this is not working. Tunnel is up, no route to private network under Windows 11. Wireguard is boring on installation. OpenVPN on pfsense is plug & play.

  • @Elmojomo
    @Elmojomo 2 месяца назад

    Great video, very clear!
    One question: So I have the server (pfsense) and client (android phone) all set up and the handshake is good. Now what? How do I access my network? I mean, this supposedly creates a tunnel to the pfsense box, but how does that translate to giving me access to the rest of my LAN from outside? This is the part that never seems to be covered in any video or tutorial that I see. Can you elaborate? For example, now I want to use my network browser app on my phone to see the shared media on my local server at home. How would I do that using this setup?

    • @f1aziz
      @f1aziz 24 дня назад

      14:14 Allowed IP ranges.

  • @josecorreia2584
    @josecorreia2584 2 месяца назад

    Great great job! I'm being watch your videos and all of them are awesome. I used wireguard with homeassistant in the past without any issue. Since I migrate all my network to pfsense, I stoped use wireguard for a while, until today. Now I can remotly access to my networks with your help. Anyway and because my ISP refuse provide bridge service, I link the ISP modem/router through DMZ to my pfsense box. In that case the pfsense WAN interface has a private IP, but in the wireguard client configuration I setup with the Public IP. It's fine that way or should I change the endpoint IP for the WAN private IP? TKS in advance for your comments

    • @DigitalMirrorComputing
      @DigitalMirrorComputing  2 месяца назад

      First of all thanks for watching and for the support msg! If I understood correctly, it's fine to have a private IP assigned to the WAN and to use that with wireguard. I think i the video that's what I did. If you have the option to choose, I would rather have the modem in bridge mode (cable modem only) and place pfsense between the WAN and LAN as that's the correct way to place the firewall. I also don't think you need the DMZ, you can simply disable the DHCP Server (if you have that option) in the modem, and let your pfsense box assume the role of dhcp server. You will run into double NAT, but it's more secure than going through the DMZ (if I understood correctly). Since DHCP is layer 3, if you disable the DHCP, the modem will still work at switch level and you can also use the wireless. I hope this helps mate, but happy to stand corrected if I didn't understand your question! :)

    • @josecorreia2584
      @josecorreia2584 2 месяца назад

      @@DigitalMirrorComputing tks yr quickly reply. In general u got the real picture of my infraestructure, but some other questions arises to me.
      the main question it's if the endpointin of the WG setup is the public ip got from ISP modem/router or the private IP from the LAN side of ISP router which feed to my WAN pfsense box?
      Related of the way I bridged the out/in traffic with DMZ configuration, it was to avoid the 2xNAT, and dont delay the traffic. but perharps this is too strict and it will not have any visible effect on the private network. by security reasons If I have to live with double nat, so it will be. In the other hand, I really trust in to pfsense firewall. Sometimes the best is the enemy of the good.

  • @okanerdem
    @okanerdem 4 дня назад

    When i use wireguard on pfsense and when i do speedtest,it crash the pfsense unit. Can not possible to internet. What can be issue?

    • @DigitalMirrorComputing
      @DigitalMirrorComputing  3 дня назад +1

      check your memory and cpu with htop or top. Your filesystem might also be corrupted. I would reinstall the whole thing from fresh! Good luck mate!

    • @okanerdem
      @okanerdem 3 дня назад

      @@DigitalMirrorComputing Thanks for the answer. Will check:)

  • @appleitunes7449
    @appleitunes7449 3 месяца назад

    can you help me, its not working. maybe i cant copy the pre shared key and cant type it in the wireguard note in windows. all in all i followed your tuts

    • @stanley_cz217
      @stanley_cz217 3 месяца назад

      Copy key buttons only work in HTTPS mode

  • @xheezy
    @xheezy 5 месяцев назад

    was just to ask how about tailscale since its built on top of wireguard as well. RIght now I'm using taiscale and setup a rpi 4 as a tailscale exit node and router so that I can still access hosts on my LAN that can't install a VPN client software

    • @xheezy
      @xheezy 5 месяцев назад

      Competely understand the "layers" thing but for my purposes tailscale is fine and I don't have to open a port on my wan

    • @DigitalMirrorComputing
      @DigitalMirrorComputing  5 месяцев назад +1

      @@xheezy Oh totally mate, Tailscale is great and simplifies wireguard a lot! If it fits your purpose why change right! :)) I might do a video on it as well as there some good benefits for using it!

    • @KevinF923
      @KevinF923 5 месяцев назад

      I use Zerotier. Might test this out once I finally get my Opnsense up and runnning, but I rarely need to access anything when I'm away from home, and 99% of the time just one box. Really enjoy the videos.

  • @Damia-cz8og
    @Damia-cz8og 4 месяца назад

    how guide VPN Wireguard and connect close ip public yes final network ip see VPN yes router "PFSENSE"

  • @amoryblaine1102
    @amoryblaine1102 4 месяца назад

    how do u intstall pfSense in MacBook Sonoma?

  • @donnied8127
    @donnied8127 3 месяца назад

    One question, if you have local domains on let's say office network like laptop01.local, Wireguard cannot resolve those, and you could need your laptop01 actual IP address...any idea how to work around that?