{"id":57,"date":"2024-07-24T08:12:44","date_gmt":"2024-07-24T08:12:44","guid":{"rendered":"http:\/\/192.168.40.2\/?p=57"},"modified":"2025-07-24T08:50:21","modified_gmt":"2025-07-24T08:50:21","slug":"how-to-set-up-wireguard-in-pfsense-establish-a-secure-vpn-connection","status":"publish","type":"post","link":"https:\/\/allogman.com\/?p=57","title":{"rendered":"How to set up WireGuard in pfSense: Establish a secure VPN connection"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Installing WireGuard<\/strong><\/h2>\n\n\n\n<p>WireGuard, on pfSense, is an add-on package. So the first thing we need to do is install the WireGuard package.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>System<\/strong>\u00a0>\u00a0<strong>Package Manager<\/strong>. The\u00a0<strong>Package Manager<\/strong>\u00a0is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/2_System_PackageManager.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Available Packages<\/strong>\u00a0to display the list of available packages.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/3_AvailablePackages.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Scroll down until you see\u00a0<strong>WireGuard<\/strong>. Click\u00a0<strong>Install<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/4_InstallWGPackage.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>You\u2019re prompted to confirm the installation. Click\u00a0<strong>Confirm<\/strong>. The installation begins. When complete, you should see\u00a0<strong>Success<\/strong>\u00a0at the bottom of the installation window.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/5_ConfirmWGInstall.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/6_WGPackage_Installed.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Configuring the tunnel<\/strong><\/h2>\n\n\n\n<p>In this step, we\u2019re going to start configuring our WireGuard tunnel to our VPN provider.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>VPN<\/strong>\u00a0>\u00a0<strong>WireGuard<\/strong>. The WireGuard options are displayed. We\u2019re on the\u00a0<strong>Tunnels<\/strong>\u00a0tab by default.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/7_PackageInstalledWGMenu.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Add Tunnel<\/strong>. The WireGuard\u00a0<strong>Tunnels<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/9_Add_WG_Tunnel.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Make sure\u00a0<strong>Enable Tunnel<\/strong>\u00a0is ticked (it should be by default).<\/li>\n\n\n\n<li>Fill in a description for your tunnel.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Listen Port<\/strong>.<\/li>\n\n\n\n<li>Click\u00a0<strong>Generate<\/strong>\u00a0next to the\u00a0<strong>Interface Keys<\/strong>\u00a0boxes and copy the\u00a0<strong>public key<\/strong>. You will need to upload this to your VPN provider.<\/li>\n\n\n\n<li><strong>*<\/strong>For\u00a0<strong>Windscribe<\/strong>, paste the private key you obtained from the config generator in the\u00a0<strong>Private Key<\/strong>\u00a0box. Your public key will be automatically derived from the private key.<\/li>\n\n\n\n<li>In the\u00a0<strong>Interface Addresses<\/strong>\u00a0field, paste the IP address assigned by your VPN provider, setting the subnet mask to\u00a0<strong>\/32<\/strong>. This guide assumes most people will configure only an IPv4 WireGuard tunnel. However, if your provider offers IPv4 and IPv6 and you want to use both, you can click\u00a0<strong>Add<\/strong>\u00a0<strong>Address<\/strong>\u00a0and add the IPv6 address assigned by your provider.<\/li>\n\n\n\n<li>Add a description (optional).<\/li>\n\n\n\n<li>Click\u00a0<strong>Save Tunnel<\/strong>. You\u2019re taken back to the\u00a0<strong>Tunnels<\/strong>\u00a0page.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/11_ConfigureTunnelSave_e.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Configuring the peer<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Click the\u00a0<strong>Peers<\/strong>\u00a0tab.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/12_AfterFirstSave_Tunnel_e.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Add Peer<\/strong>. The\u00a0<strong>Peers<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/13_Peers_Menu.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Tick\u00a0<strong>Enable<\/strong>\u00a0<strong>Peer<\/strong>.<\/li>\n\n\n\n<li>From the\u00a0<strong>Tunnels<\/strong>\u00a0drop-down menu, select the WireGuard tunnel you just configured.<\/li>\n\n\n\n<li>In the\u00a0<strong>Description<\/strong>\u00a0box, add a description for your peer.<\/li>\n\n\n\n<li>Untick\u00a0<strong>Dynamic<\/strong>\u00a0<strong>Endpoint<\/strong>. The\u00a0<strong>Endpoint<\/strong>\u00a0and\u00a0<strong>Port<\/strong>\u00a0boxes appear.<\/li>\n\n\n\n<li>Enter the IP address of your VPN provider\u2019s WireGuard \u201cserver\u201d (endpoint) and the port used to connect. You can find this on your VPN provider\u2019s web page.<\/li>\n\n\n\n<li>You can optionally set a\u00a0<strong>Keep<\/strong>\u00a0<strong>Alive<\/strong>\u00a0interval.\u00a0<strong>25<\/strong>\u00a0is usually fine.<\/li>\n\n\n\n<li>Enter the WireGuard \u201cserver\u201d\u2018s public key in the Public Key field. Again, you can find this on your VPN provider\u2019s web page.<\/li>\n\n\n\n<li>Under\u00a0<strong>Address<\/strong>\u00a0<strong>Configuration<\/strong>, enter\u00a0<strong>0.0.0.0\/0<\/strong>\u00a0in the\u00a0<strong>Allowed<\/strong>\u00a0<strong>IPs<\/strong>\u00a0field. That configures all traffic to go through the WireGuard tunnel.<\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>\u00a0<strong>Peer<\/strong>. You\u2019re taken back to the\u00a0<strong>Peers<\/strong>\u00a0page.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/14_ConfigurePeerSave.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Enabling the WireGuard service<\/strong><\/h2>\n\n\n\n<p>Now that we\u2019ve set up our tunnel and our peer, we can enable the WireGuard service on pfSense.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Click the\u00a0<strong>Settings<\/strong>\u00a0tab. The\u00a0<strong>Settings<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/15_SavedPeerClickSettings_e.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Tick\u00a0<strong>Enable<\/strong>\u00a0<strong>WireGuard<\/strong>, at the top.<\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>. The WireGuard service is now running. You should see a green banner at the top indicating this.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/16_EnableWG.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Creating the WireGuard interface &amp; gateway<\/strong><\/h2>\n\n\n\n<p>We now need to create an interface and a gateway that pfSense will use to establish and push traffic through the WireGuard tunnel.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Interface<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Interfaces<\/strong>\u00a0<strong>><\/strong>\u00a0<strong>Assignments<\/strong>. The\u00a0<strong>Interface<\/strong>\u00a0<strong>Assignments<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/17_GoTo_Interface_Assignments.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click the green\u00a0<strong>Add<\/strong>\u00a0button.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/18_AddWGInterface.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li><strong>OPT1<\/strong>\u00a0(optional interface 1) is now listed as an interface. Click\u00a0<strong>OPT1<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/19_Click_OPT1.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>The\u00a0<strong>OPT1<\/strong>\u00a0interface page is displayed.<\/li>\n\n\n\n<li>Click\u00a0<strong>Enable<\/strong>\u00a0<strong>interface<\/strong>.<\/li>\n\n\n\n<li>In the\u00a0<strong>Description<\/strong>\u00a0box, name your interface.<\/li>\n\n\n\n<li>From the\u00a0<strong>IPv4 Configuration Type<\/strong>\u00a0drop-down menu, select\u00a0<strong>Static<\/strong>\u00a0<strong>IPv4<\/strong>.<\/li>\n\n\n\n<li>Under\u00a0<strong>Static<\/strong>\u00a0<strong>IPv4<\/strong>\u00a0<strong>Configuration<\/strong>, in the\u00a0<strong>IPv4<\/strong>\u00a0<strong>Address<\/strong>\u00a0box, paste the IP address your VPN provider assigned to you and set the\u00a0<strong>\/32<\/strong>\u00a0subnet mask.<\/li>\n\n\n\n<li>Repeat the steps for IPv6 if you want to use both IPv4 and IPv6. Select\u00a0<strong>Static<\/strong>\u00a0<strong>IPv6<\/strong>\u00a0from the\u00a0<strong>IPv6<\/strong>\u00a0<strong>Configuration<\/strong>\u00a0<strong>Type<\/strong>\u00a0drop-down menu and paste the IPv6 address assigned by your VPN provider in the\u00a0<strong>IPv6<\/strong>\u00a0<strong>Address<\/strong>\u00a0box (with a\u00a0<strong>\/128<\/strong>\u00a0subnet mask).<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/20_Confidure_Interface_And_Add_Gateway.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gateway<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Next to the\u00a0<strong>IPv4<\/strong>\u00a0<strong>Upstream<\/strong>\u00a0<strong>gateway<\/strong>\u00a0drop-down menu, click\u00a0<strong>Add<\/strong>\u00a0<strong>a<\/strong>\u00a0<strong>new<\/strong>\u00a0<strong>gateway<\/strong>. The\u00a0<strong>New<\/strong>\u00a0<strong>IPv4<\/strong>\u00a0<strong>Gateway<\/strong>\u00a0menu is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/NEW_AddGateway.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>In the\u00a0<strong>Gateway<\/strong>\u00a0<strong>name<\/strong>\u00a0box, provide a name for your gateway. It must be different from the interface name.<\/li>\n\n\n\n<li>In the\u00a0<strong>Gateway<\/strong>\u00a0<strong>IPv4<\/strong>\u00a0box, paste the IP address assigned to you by your VPN provider, as we did with the interface above.<\/li>\n\n\n\n<li>In the\u00a0<strong>Description<\/strong>\u00a0<strong>box<\/strong>, type in a description (optional).<\/li>\n\n\n\n<li>Click\u00a0<strong>Add<\/strong>. You\u2019re back on the\u00a0<strong>OPT1<\/strong>\u00a0interface page.<\/li>\n\n\n\n<li>Under\u00a0<strong>Static<\/strong>\u00a0<strong>IPv4<\/strong>\u00a0<strong>Configuration<\/strong>, from the\u00a0<strong>IPv4<\/strong>\u00a0<strong>Upstream<\/strong>\u00a0<strong>gateway<\/strong>\u00a0drop-down menu, select the gateway we just created.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/21_Configure_Gateway.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>.<\/li>\n\n\n\n<li>Click\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>\u00a0at the top. We\u2019ve created the WireGuard interface and gateway.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/22_Save_Interface.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Repeat these steps for IPv6 (using the IPv6 address assigned by your VPN provider) if you want to use both IPv4 and IPv6.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Setting the LAN MSS clamping<\/strong><\/h2>\n\n\n\n<p>WireGuard\u2019s maximum transmission unit (MTU) is 1420. What that means is that if a datagram exceeds 1420 bytes, it will be fragmented, which may break the connection. If you have MTU issues while using WireGuard, one symptom will be that certain websites won\u2019t load. And you\u2019ll be scratching your head trying to figure out why some sites load just fine while others do not. When I first set up WireGuard on my router, I scratched my head with this issue for days before considering MTU issues and setting up MSS clamping.<\/p>\n\n\n\n<p>MSS stands for Maximum TCP Segment Size and adjusts the size of the datagram being transmitted to \u201cfit\u201d the data link over which it\u2019s being transmitted without fragmentation. In other words, MSS clamping makes sure it is small enough to fit through the transiting interface\u2019s MTU.<\/p>\n\n\n\n<p>We will MSS clamp our LAN interface to make sure our WireGuard tunnel works smoothly.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Interfaces<\/strong>\u00a0>\u00a0<strong>LAN<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/ADD_GoTo_LAN.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Under\u00a0<strong>General<\/strong>\u00a0<strong>Configuration<\/strong>, in the\u00a0<strong>MSS<\/strong>\u00a0field, enter\u00a0<strong>1380<\/strong>. 1380 is a good value that should work on most systems. Other values may work too. Feel free to experiment; just remember to stay under 1420. Repeat these steps for any other OPT interfaces you want to add.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/ADD_LAN_MSS.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>\u00a0at the bottom of the page and\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Configuring&nbsp;NAT<\/strong><\/h2>\n\n\n\n<p>We now need to configure Network Address Translation for our WireGuard tunnel.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Firewall<\/strong>\u00a0<strong>><\/strong>\u00a0<strong>NAT<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/24_GoTo_NAT.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Select the\u00a0<strong>Outbound<\/strong>\u00a0tab.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/24_GoTo_Nat_Outbound.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Under\u00a0<strong>Outbound<\/strong>\u00a0<strong>NAT<\/strong>\u00a0<strong>Mode<\/strong>, select\u00a0<strong>Manual<\/strong>\u00a0<strong>Outbound<\/strong>\u00a0<strong>NAT<\/strong>\u00a0<strong>rule<\/strong>\u00a0<strong>generation<\/strong>. We need to set this because we want to create our own NAT rules to route our traffic through the WireGuard tunnel.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/25_Select_Manual_NAT.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/26_Save_ManualNAT.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>\u00a0at the top.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/27_ManualNAT_ApplyChanges.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Because we want to force all LAN traffic through the WireGuard tunnel, we want to delete any NAT rules that allow LAN traffic to go out through the WAN interface. Select the rules as shown below for your LAN interface and click\u00a0<strong>Delete<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/28_Delete_LAN_via_WAN_Rules.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>. Your rules should look like the screenshot below.\u00a0<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/29_OutboundNAT_ApplyChanges.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li><strong>Note<\/strong>: If you only want to use IPv4, you can also delete the IPv6 rules.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/30_NATOutbound_IPV4ONLY.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Configuring firewall rules<\/strong><\/h2>\n\n\n\n<p>We\u2019re now going to create firewall rules to route our LAN traffic through the WireGuard tunnel.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Firewall<\/strong>\u00a0>\u00a0<strong>Rules<\/strong>. The\u00a0<strong>Firewall<\/strong>\u00a0<strong>Rules<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/31_GoTo_Firewall_Rules.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Select the\u00a0<strong>LAN<\/strong>\u00a0tab. The LAN firewall rules are displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/32_Select_LAN_Tab.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click the\u00a0<strong>Add<\/strong>\u00a0(top) button. An empty firewall rule is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/33_Firewall_Rules_Click_Add.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Set the\u00a0<strong>Action<\/strong>\u00a0field to\u00a0<strong>Pass<\/strong>.<\/li>\n\n\n\n<li>Make sure the\u00a0<strong>Interface<\/strong>\u00a0field is set to\u00a0<strong>LAN<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Address<\/strong>\u00a0<strong>Family<\/strong>\u00a0field to\u00a0<strong>IPv4<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Protocol<\/strong>\u00a0to\u00a0<strong>Any<\/strong>.<\/li>\n\n\n\n<li>Under\u00a0<strong>Source<\/strong>, set the\u00a0<strong>Source<\/strong>\u00a0drop-down menu to\u00a0<strong>LAN.net<\/strong>.<\/li>\n\n\n\n<li>Under\u00a0<strong>Destination<\/strong>, set the\u00a0<strong>Destination<\/strong>\u00a0drop-down menu to\u00a0<strong>any<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/34_Firewall_Rule_Part1.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Under\u00a0<strong>Extra<\/strong>\u00a0<strong>Options<\/strong>, next to the\u00a0<strong>Advanced<\/strong>\u00a0<strong>Options<\/strong>\u00a0field, click the\u00a0<strong>Display<\/strong>\u00a0<strong>Advanced<\/strong>\u00a0button. The\u00a0<strong>Advanced<\/strong>\u00a0<strong>Options<\/strong>\u00a0are displayed.<\/li>\n\n\n\n<li>Scroll down to the\u00a0<strong>Gateway<\/strong>\u00a0field and select the WireGuard gateway we configured earlier from the drop-down menu.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/35_Firewall_Rule_Set_Gateway.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>.<\/li>\n\n\n\n<li>Click\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>. The new rule is displayed under the Anti-Lockout Rule. If you want to use both IPv4 and IPv6, repeat these steps for IPv6.<\/li>\n\n\n\n<li>Click the\u00a0<strong>green<\/strong>\u00a0<strong>arrow<\/strong>\u00a0next to two default LAN rules to disable them. Now our LAN traffic can only go out through the WireGuard gateway.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/36_Firewall_rules_deactivateWANRules_Apply.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Static routes<\/strong><\/h2>\n\n\n\n<p>In a few steps, we\u2019re going to set our WireGuard gateway as the default gateway for our pfSense box. To make sure that there are no errors when booting up pfSense (where it would try to initiate the tunnel through the WireGuard gateway itself), we\u2019re going to set up a static route for pfSense to use the WAN interface to initiate the tunnel.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>System<\/strong>\u00a0>\u00a0<strong>Routing<\/strong>. The Routing page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/37_GoTo_Routing.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Select the\u00a0<strong>Static<\/strong>\u00a0<strong>Routes<\/strong>\u00a0tab. The\u00a0<strong>Static<\/strong>\u00a0<strong>Routes<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/38_select_Static_Routes_Tab.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click the\u00a0<strong>Add<\/strong>\u00a0button.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/39_Click_Add.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>In the\u00a0<strong>Destination<\/strong>\u00a0<strong>network<\/strong>\u00a0field, enter the IP address for the WireGuard \u201cserver\u201d you\u2019re connecting to. That is the same address used when configuring our WireGuard peer.<\/li>\n\n\n\n<li>From the\u00a0<strong>Gateway<\/strong>\u00a0drop-down menu, select the\u00a0<strong>WAN<\/strong>\u00a0gateway.<\/li>\n\n\n\n<li>In the\u00a0<strong>Description<\/strong>\u00a0field, enter a description for your static route (optional).<\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>. You\u2019re taken back to the\u00a0<strong>Static<\/strong>\u00a0<strong>Routes<\/strong>\u00a0page.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/40_Configure_StaticRoute.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/41_Static_Route_Apply.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Setting the default gateway<\/strong><\/h2>\n\n\n\n<p>We\u2019re now going to set our WireGuard gateway as the pfSense box\u2019s default gateway.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Select the\u00a0<strong>Gateways<\/strong>\u00a0tab.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/42_Select_Gateways_Tab.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Under\u00a0<strong>Default<\/strong>\u00a0<strong>gateway<\/strong>, from the\u00a0<strong>Default<\/strong>\u00a0<strong>gateway<\/strong>\u00a0<strong>IPv4<\/strong>\u00a0drop-down menu, select your (IPv4) WireGuard gateway.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/43_Set_Default_Gateway.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>If you want to use both IPv4 and IPv6, repeat the above steps for\u00a0<strong>Default<\/strong>\u00a0<strong>gateway<\/strong>\u00a0<strong>IPv6<\/strong>.<\/li>\n\n\n\n<li>Click\u00a0<strong>Save\u00a0<\/strong>and<strong>\u00a0Apply Changes.<\/strong><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Configuring DNS<\/strong><\/h2>\n\n\n\n<p>In the following steps, we\u2019re going to configure our DNS settings for our WireGuard tunnel.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>General Setup<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>System<\/strong>\u00a0>\u00a0<strong>General<\/strong>\u00a0<strong>Setup<\/strong>. The\u00a0<strong>General<\/strong>\u00a0<strong>Setup<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/45_GoTo_GeneralSetup.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Under\u00a0<strong>DNS<\/strong>\u00a0<strong>Server<\/strong>\u00a0<strong>Settings<\/strong>, in the\u00a0<strong>DNS<\/strong>\u00a0<strong>Servers<\/strong>\u00a0field, enter your VPN provider\u2019s DNS server IP address.<\/li>\n\n\n\n<li>In the\u00a0<strong>Gateway<\/strong>\u00a0field, select the WireGuard gateway.<\/li>\n\n\n\n<li>Uncheck the\u00a0<strong>DNS<\/strong>\u00a0<strong>Server<\/strong>\u00a0<strong>Override<\/strong>\u00a0box.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/46_Set_DNS_Server_Scroll_Down_To_Save.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Scroll down to the bottom of the page and click\u00a0<strong>Save<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>DNS Resolver<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Services<\/strong>\u00a0>\u00a0<strong>DNS<\/strong>\u00a0<strong>Resolver<\/strong>. The\u00a0<strong>DNS<\/strong>\u00a0<strong>Resolver<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/47_GoTo_DNSResolver.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>If your VPN provider supports\u00a0<strong>DNSSEC<\/strong>, enable it by ticking the box. That provides a small enhancement in the security (authentication) of your DNS requests.<\/li>\n\n\n\n<li>Next to\u00a0<strong>DNS<\/strong>\u00a0<strong>Query<\/strong>\u00a0<strong>Forwarding<\/strong>, tick the\u00a0<strong>Enable Forwarding Mode<\/strong>\u00a0box. This forwards your DNS queries to the DNS server we configured in the previous step, in\u00a0<strong>System<\/strong>\u00a0>\u00a0<strong>General<\/strong>\u00a0<strong>Setup<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/48_DNSResolver_ForwardingMode__DNSSEC_ifSupported_Scroll_Down_To_Save.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Scroll down to the bottom of the page and click\u00a0<strong>Save<\/strong>\u00a0and\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>DHCP DNS settings<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Services<\/strong>\u00a0>\u00a0<strong>DHCP<\/strong>\u00a0<strong>Server<\/strong>. The\u00a0<strong>LAN<\/strong>\u00a0<strong>DHCP<\/strong>\u00a0<strong>Server<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/70_ExtraDNS_GoTo_DHCPServer.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Under\u00a0<strong>Servers<\/strong>, in the\u00a0<strong>DNS<\/strong>\u00a0<strong>Server<\/strong>\u00a0<strong>1<\/strong>\u00a0field, enter your VPN provider\u2019s DNS server IP address (the same server that we set in\u00a0<strong>System<\/strong>\u00a0>\u00a0<strong>General<\/strong>\u00a0<strong>Setup<\/strong>).<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/71_ExtraDNS_Set_DNSServer_in_DHCP.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Scroll down and click\u00a0<strong>Save\u00a0<\/strong>and<strong>\u00a0Apply Changes.<\/strong><\/li>\n<\/ol>\n\n\n\n<p>So the DHCP-assigned DNS server is for our LAN clients, while the DNS Resolver is set to be used by the pfSense box itself and any other OPT interfaces that you may add in the future. Both are configured to use your VPN provider\u2019s DNS server, only accessible through the WireGuard tunnel.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Extra \u2013 Configuring a kill switch<\/strong><\/h2>\n\n\n\n<p>Most decent VPN apps include a kill switch. A kill switch cuts off your traffic from the internet if your VPN connection ever goes down. This ensures that packets don\u2019t go out through your regular ISP gateway \u2013 the WAN interface on a router.<\/p>\n\n\n\n<p>While we don\u2019t need a dedicated app to connect to our VPN provider when it\u2019s set up on the router (hooray), we can still configure a kill switch using floating firewall rules. Floating rules differ from regular firewall rules in that they\u2019re applied first and that they can apply to multiple interfaces at once \u2013 though it\u2019s the former that interests us here.<\/p>\n\n\n\n<p>We will use pfSense\u2019s floating rules to set up a kill switch for our WireGuard tunnel.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Firewall<\/strong>\u00a0>\u00a0<strong>Rules<\/strong>. The\u00a0<strong>Firewall<\/strong>\u00a0<strong>Rules<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/49_GoTo_FirewallRules.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click on the\u00a0<strong>Floating<\/strong>\u00a0tab. The\u00a0<strong>Floating<\/strong>\u00a0<strong>Rules<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/50_Select_FloatingTab.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click the\u00a0<strong>Add<\/strong>\u00a0(top) button.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/51_Click_Add.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Set the\u00a0<strong>Action<\/strong>\u00a0field to\u00a0<strong>Reject<\/strong>.<\/li>\n\n\n\n<li>Tick the\u00a0<strong>Quick<\/strong>\u00a0box.<\/li>\n\n\n\n<li>Make sure the\u00a0<strong>Interface<\/strong>\u00a0is set to\u00a0<strong>WAN<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Direction<\/strong>\u00a0to\u00a0<strong>any<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Address Family<\/strong>\u00a0to\u00a0<strong>IPv4<\/strong>\u00a0(or\u00a0<strong>IPv4 + IPv6<\/strong>\u00a0if you are using both).<\/li>\n\n\n\n<li>Set the\u00a0<strong>Protocol<\/strong>\u00a0to\u00a0<strong>Any<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Source<\/strong>\u00a0to\u00a0<strong>any<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Destination<\/strong>\u00a0to\u00a0<strong>any<\/strong>.<\/li>\n\n\n\n<li>In the\u00a0<strong>Description<\/strong>\u00a0field, enter a description for your rule (optional).<\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>. You\u2019re taken back to the Floating Rules page.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/52_Reject_Floating.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click the\u00a0<strong>Add<\/strong>\u00a0(top) button again.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Action<\/strong>\u00a0field to\u00a0<strong>Pass<\/strong>.<\/li>\n\n\n\n<li>Tick the\u00a0<strong>Quick<\/strong>\u00a0box.<\/li>\n\n\n\n<li>Make sure the\u00a0<strong>Interface<\/strong>\u00a0is set to\u00a0<strong>WAN<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Direction<\/strong>\u00a0to\u00a0<strong>any<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Address Family<\/strong>\u00a0to\u00a0<strong>IPv4<\/strong>\u00a0(or\u00a0<strong>IPv4 + IPv6<\/strong>\u00a0if you are using both).<\/li>\n\n\n\n<li>Set the\u00a0<strong>Protocol<\/strong>\u00a0to\u00a0<strong>Any<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Source<\/strong>\u00a0to\u00a0<strong>any<\/strong>.<\/li>\n\n\n\n<li>Set the\u00a0<strong>Destination<\/strong>\u00a0drop-down menu to\u00a0<strong>Single host or alias<\/strong>.<\/li>\n\n\n\n<li>Enter the\u00a0<strong>IP address<\/strong>\u00a0of your WireGuard \u201cserver\u201d in the box to the right of the<\/li>\n\n\n\n<li><strong>Destination<\/strong>\u00a0field.<\/li>\n\n\n\n<li>In the\u00a0<strong>Description<\/strong>\u00a0field, enter a description for your rule (optional).<\/li>\n\n\n\n<li>Click\u00a0<strong>Save<\/strong>. You\u2019re taken back to the Floating Rules page.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/53_Pass_Floating.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>Apply<\/strong>\u00a0<strong>Changes<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/54_Apply.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Last steps<\/strong><\/h2>\n\n\n\n<p>OK, so we\u2019ve configured our WireGuard tunnel &amp; peer. We\u2019ve configured NAT, DNS, and our firewall rules. And we\u2019ve also configured a kill switch to boot. We\u2019re now going to reboot our pfSense box. After the reboot, we\u2019ll confirm that everything is up and running as expected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Rebooting<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Diagnostics<\/strong>\u00a0>\u00a0<strong>Reboot<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/55_GoTo_RebootMenu.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Make sure the\u00a0<strong>Reboot<\/strong>\u00a0<strong>method<\/strong>\u00a0is set to\u00a0<strong>Normal<\/strong>\u00a0<strong>reboot<\/strong>.<\/li>\n\n\n\n<li>Click\u00a0<strong>Submit<\/strong>. pfSense will reboot. Once rebooted, log back into pfSense.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/56_Reboot.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Final checks<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Checking the WireGuard tunnel status<\/strong><\/h3>\n\n\n\n<p>We can check the status of our WireGuard within pfSense.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>VPN<\/strong>\u00a0>\u00a0<strong>WireGuard<\/strong>. The WireGuard options are displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/57_GoTo_WireGuard_e.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click the\u00a0<strong>Status<\/strong>\u00a0tab. The\u00a0<strong>Status<\/strong>\u00a0page is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/58_Select_Status_Tab_e.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click the\u00a0<strong>small<\/strong>\u00a0<strong>arrow<\/strong>\u00a0to the left of the tunnel\u2019s\u00a0<strong>Name<\/strong>\u00a0field. This displays your peer\u2019s connection status.\u00a0<strong>Green<\/strong>\u00a0is good.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/59_WireGuardStatus_e.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Testing the WireGuard tunnel<\/strong><\/h3>\n\n\n\n<p>We can use curl on pfSense to test whether or not our traffic is being routed through the WireGuard tunnel.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the top menu, select\u00a0<strong>Diagnostics<\/strong>\u00a0>\u00a0<strong>Command<\/strong>\u00a0<strong>Prompt<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/LastSteps_GoTo_CommandPrompt_e2.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>In the\u00a0<strong>Execute<\/strong>\u00a0<strong>Shell<\/strong>\u00a0<strong>Command<\/strong>\u00a0box, enter:<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>curl -4 ifconfig.co - for IPv4<\/code><\/li>\n\n\n\n<li><code>curl -6 ifconfig.co - for IPv6<\/code><code><a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/LastSteps_CommandPrompt_Command.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/code><\/li>\n<\/ul>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>The last line of the\u00a0<strong>Shell<\/strong>\u00a0<strong>Output<\/strong>\u00a0window should list the IP address of the WireGuard endpoint to which you\u2019re connected.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/LastSteps_CommandPrompt_Result.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Launch a web browser and visit the\u00a0<a href=\"https:\/\/www.comparitech.com\/privacy-security-tools\/my-ip-address\/\" target=\"_blank\" rel=\"noreferrer noopener\">Comparitech IP Address Check page<\/a>. It should list the same IP address that was listed in our shell output from the previous step.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/ComparitechIPCheck.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Adding the WireGuard widget to the pfSense dashboard<\/strong><\/h3>\n\n\n\n<p>You can display a WireGuard widget on the pfSense dashboard if you like.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>From the dashboard, click the\u00a0<strong>+<\/strong>\u00a0sign at the top left of the UI. The list of\u00a0<strong>Available<\/strong>\u00a0<strong>Widgets<\/strong>\u00a0is displayed.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/60_Main_Screen_Click_Plus_e2.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>Click\u00a0<strong>WireGuard<\/strong>.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/61_Select_WireGuard_Widget.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n\n\n\n<li>The WireGuard widget is added to the dashboard.<a href=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2022\/03\/62_WireGuard_Widget_e2.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Wrap up<\/strong><\/h2>\n\n\n\n<p>So that\u2019s how you set up a \u201cclient\u201d connection to a WireGuard VPN provider in pfSense. If you run into any issues, I recommend looking at your DNS settings and firewall rules (regular and floating). A misconfiguration in those places is usually the culprit.<\/p>\n\n\n\n<p>Aside from that, VPN on.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Installing WireGuard WireGuard, on pfSense, is an add-on package. So the first thing we need to do is install the WireGuard package. Configuring the tunnel In this step, we\u2019re going<\/p>\n<p><a href=\"https:\/\/allogman.com\/?p=57\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\">How to set up WireGuard in pfSense: Establish a secure VPN connection<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-57","post","type-post","status-publish","format-standard","hentry","category-network-security"],"_links":{"self":[{"href":"https:\/\/allogman.com\/index.php?rest_route=\/wp\/v2\/posts\/57","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/allogman.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/allogman.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/allogman.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/allogman.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=57"}],"version-history":[{"count":1,"href":"https:\/\/allogman.com\/index.php?rest_route=\/wp\/v2\/posts\/57\/revisions"}],"predecessor-version":[{"id":58,"href":"https:\/\/allogman.com\/index.php?rest_route=\/wp\/v2\/posts\/57\/revisions\/58"}],"wp:attachment":[{"href":"https:\/\/allogman.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=57"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/allogman.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=57"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/allogman.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}