*For Testing ONLY: WireGuard VPN Package on pfSense CE 2.5.2 (On Win10 and iOS clients)
pfSense Tunnel Set-up (Copy the public key here and paste on the "peer" public key on your client)
pfSense Peer set-up (Copy the public key from your client to the peer setting here)
Win10 client set-up (Key in the setting using the format below. Copy the public key from pfsense tunnel setting to client [Peer] here. End point either key in your DDNS or your static IPs) Do uncheck “block untunneled traffic”. The Public key shown in the row below the “Name” will be the one you copy and paste on the “Peer” on pfsense. The private keys are self generated, do not alter!
Peer Settings on iOS:
When set to cellular for connection "On demand", you will automatically connect to your WireGuard VPN when you leave your home network. Set up is quite similar with using the WireGuard application on Win10. I experienced some crashes on iOS client app. You may need to disable the “on demand” setting and manually activate/deactivate it. Allowed IPs can just put 0.0.0.0/0.
NOTE:
- You do need to assign the WireGuard interface and set up the firewall rules like what you normally do when setting up a new interface
- You can set the WireGuard interface to assign IPs to the connections coming in (or assign IPs at client side) with/without the DHCP server running.
- Do ensure your assigned IPs for WireGuard do not clash with your other internal (VLAN) IPs. In my case, I assign the 192.168.40.XX and 192.168.80.XX for two separate tunnels.
SPEEDTEST: Close to Line Speed VPN
WireGuard OFF:
WireGuard ON: