Wireguard VPN server/client not working

I can’t seem to connect to the home network through Wireguard from client on Android via Wireguard server on Route10 anymore.

I tried removing and creating new user config on Route10 and exporting new client config (file download), and for other reasons also performed a full PoR for the Route10, but to no avail regarding the Wireguard tunnel.

Phone is OnePlus 10 Pro, and using the Android Wireguard app.

Client config is downloaded from On-premises Control and imported as is to the Wireguard app.

Anyone else having this issue?

1 Like

Just tested on my Pixel 9 Pro XL, and it worked without issue, and I was able to connect to internal-only services.

1 Like

Usually even when there are issues, it will still report connected. So is it truly not connecting at all? Or is it connecting but showing only unidirectional traffic in the client?

You can also check wg show on the router can give peer info, specifically you’d be looking at bytes sent, received and latest handshake. That same info is also in the client app, when you look at extra info for the active connection. If you see the unidirectional issue, you’d only have bytes sent, and would be missing received and a current handshake.

Does the DDNS hostname resolve to the expected external IP? Assuming you’re using that as the peer address and not overwriting it manually. If the external IP DOES resolve correctly, can you provide me the content of /etc/config/firewall? Either here or DM/email is fine, depending on preference. There maybe some identifiable information, like wan IPs or PPPoE credentials, and those are safe to remove (especially any credentials).

2 Likes

Are you using something like starlink with CGNAT?

2 Likes

So, the full DDNS adress as exported from Control (x.y.ddns.manage.alta.inc) and imported to Wireguard app comes out as a bogon IP from lookup (CLI on Route10), at the Address 1 line, followed by
can’t find…no answer.

The regular Control adress (y.ddns.manage.alta.inc) comes out as my public IP, at the Address 1 line followed by can’t find…no answer.

So, now when I think of it, as I changed ISP a few weeks ago, I might have overlooked the possibility that I might now be behind CGNAT?! And as I am not familiar with that since before I didn’t consider that.

Symptoms above are most certainly associated to CGNAT.

2 Likes

Does the ip your route get in this range 100.64.0.0 to 100.127.255.255?

1 Like

Yes, indeed.

1 Like

Yeah looks like cgnat. You might be better off with something like tailscale.

2 Likes

As far as I know, we do plan to add Tailscale support in a future update. Or last time I asked. That won’t help now, but thought it was worth mentioning here.

@ebuckland81 unfortunately this won’t work (at this time) without a direct IP because CGNAT address space is not publicly routable. Tailscale or similar services are required behind CGNAT because they are a mesh-style VPN architecture, where the nodes connect through external coordination servers.

2 Likes

I contacted the ISP, and, luckily, they can set up a public IP. :slightly_smiling_face: So within a few days I will give it another shot.

@Alta-MikeD and @dalewhlrr, thanks for helping out!

1 Like

Great news! Forgot to mention that as an option.

Just as a note, while unlikely, if the Route10 still gets a CGNAT or similar IP on it’s WAN interface then you’ll need to edit the (WG client) profile and add public. subdomain to the DDNS hostname of the peer (like in the WG app on your respective devices). This forces it to use the real external IP instead of the literal interface address. This doesn’t work around CGNAT itself, but if for some reason the public were terminated elsewhere in the network, and you still had a non-routable address on the interface, you’d want to use that hostname variant.

3 Likes

That’s handy to know! Is that mentioned in the DDNS documentation anywhere? I did a quick search for reference purposes and didn’t see that off hand. Thanks!

1 Like

ISP handled it fast, added a public IP to our connection, and the VPN tunnel started working directly. Yay :blush:

2 Likes

I sure wish HINT HINT WINK WINK there was a way for us to know when clients are conencted !!:face_with_bags_under_eyes:

3 Likes