heysoundude
Part of the Furniture
Woah! I stand corrected. I’ve got the ac86 too
Sent from my iPhone using Tapatalk
Sent from my iPhone using Tapatalk
Is this a good or bad thing for us?As WireGuard will be merged into linux 5.6,
the kernel modules and userspace tools have been split into separate packages.
iptables -A INPUT -s 192.168.1.0/24 -d 192.168.1.0/24 -p tcp -m tcp --dport 21 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT && \
iptables -A INPUT -s 192.168.1.0/24 -d 192.168.1.0/24 -p tcp -m tcp --dport 20 -m conntrack --ctstate ESTABLISHED -j ACCEPT && \
iptables -A INPUT -s 192.168.1.0/24 -d 192.168.1.0/24 -p tcp -m tcp --sport 1024: --dport 1024: -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT && \
iptables -A OUTPUT -s 192.168.1.0/24 -d 192.168.1.0/24 -p tcp -m tcp --sport 21 -m conntrack --ctstate ESTABLISHED -j ACCEPT && \
iptables -A OUTPUT -s 192.168.1.0/24 -d 192.168.1.0/24 -p tcp -m tcp --sport 20 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT && \
iptables -A OUTPUT -s 192.168.1.0/24 -d 192.168.1.0/24 -p tcp -m tcp --sport 1024:65535 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
You need the user space tools, the kernel package only contains wireguardThe opkg install /path/wireguard-kernel_0.0.20200128-ac_aarch64-3.10.ipk does not seem to be installing correctly it is not creating a wireguard directory or installing the config files. If i use this older version it works fine wireguard_0.0.20191012-ac_aarch64-3.10.ipk
Thank you! I had not seen the change with the User space tools. Does it matter which order they are installed in? Is there any other changes?You need the user space tools, the kernel package only contains wireguard
The kernel first, then userspace tools is probably the correct procedure.
Sent from my iPhone using Tapatalk
Just meant one that's point and click button style, easy to set up and use.
Might be a bit too early, maybe Asus will eventually put it in there officially once WG is more stable and fully released.
change Route to policy and add this to end of wg-policy script.
This may enough for you.Code:ip rule del prio 11111 2>/dev/null ip rule del prio 11112 2>/dev/null ip rule add from 192.168.1.10 lookup 117 prio 11111 ip rule add from 192.168.1.20 lookup 117 prio 11112
Don't touch ##For ipset based Policy Routing part.
This two rules should be added to wg-down script too.
ip rule del prio 11111 2>/dev/null
ip rule del prio 11112 2>/dev/null
change Route to policy and add this to end of wg-policy script.
This may enough for you.Code:ip rule del prio 11111 2>/dev/null ip rule del prio 11112 2>/dev/null ip rule add from 192.168.1.10 lookup 117 prio 11111 ip rule add from 192.168.1.20 lookup 117 prio 11112
Don't touch ##For ipset based Policy Routing part.
This two rules should be added to wg-down script too.
ip rule del prio 11111 2>/dev/null
ip rule del prio 11112 2>/dev/null
#
##For ipset based Policy Routing
#
modprobe ip_set_hash_ip
ipset -N $Nipset hash:ip
ip rule del prio 9997 2>/dev/null
ip rule add fwmark 0x7000 table 117 prio 9997
iptables -t mangle -D PREROUTING -m set --match-set $Nipset dst -j MARK --set-mark 0x7000/0x7000 2>/dev/null
iptables -t mangle -A PREROUTING -m set --match-set $Nipset dst -j MARK --set-mark 0x7000/0x7000
ip rule del prio 11111 2>/dev/null
ip rule add from 192.168.0.0/24 lookup 117 prio 11111
ip rule del prio 11100 2>/dev/null
ip rule add from 10.10.10.0/24 lookup 117 prio 11100
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!