E:Option ==> diag
WireGuard VPN Peer Status
interface: wg21
public key: ichMaZLYJmwFSrJdu682D72TPaCg32zEFxtUrb3/enk=
private key: (hidden)
listening port: 51820
peer: CrCkxoXyDVgk9jMQmUDpIc0Wc7ACZx06oGPY54sIYhw=
endpoint: <my mobile public ip>:8323
allowed ips: 0.0.0.0/0
latest handshake: 1 minute, 47 seconds ago
transfer: 135.18 KiB received, 487.40 KiB sent
interface: wg11
public key: TMsFXcl2JHJnJilh26OdicticNiriEOFRD3TqglVOVU=
private key: (hidden)
listening port: 54863
peer: l1sRg+3hrtHWrEKxvZ9zrzQ5G+ewLIowIAc9HTWyDlM=
endpoint: 202.87.221.198:51820
allowed ips: 0.0.0.0/0
latest handshake: 45 seconds ago
transfer: 145.93 KiB received, 45.54 KiB sent
persistent keepalive: every 25 seconds
DEBUG: Routing info MTU etc.
34: wg21: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.50.1.1/24 scope global wg21
valid_lft forever preferred_lft forever
35: wg11: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.5.0.2/32 scope global wg11
valid_lft forever preferred_lft forever
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 wg11
10.50.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wg21
128.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 wg11
DEBUG: RPDB rules
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9990: from all fwmark 0x8000/0x8000 lookup main
9993: from all fwmark 0x4000/0x4000 lookup ovpnc3
10501: from 10.16.0.0/24 lookup ovpnc3
10502: from 192.168.1.11 lookup ovpnc3
10503: from 192.168.1.21 lookup ovpnc3
10504: from 192.168.1.2 lookup ovpnc3
32766: from all lookup main
32767: from all lookup default
DEBUG: Routing Table 121 (wg11) # my38.nordvpn.com
0.0.0.0/1 dev wg11 scope link
128.0.0.0/1 dev wg11 scope link
192.168.1.0/24 dev br0 proto kernel scope link src 192.168.1.1
DEBUG: Routing Table main
0.0.0.0/1 dev wg11 scope link
10.50.1.0/24 dev wg21 proto kernel scope link src 10.50.1.1
128.0.0.0/1 dev wg11 scope link
DEBUG: UDP sockets.
netstat: showing only processes with your user ID
udp 0 0 0.0.0.0:54863 0.0.0.0:* -
udp 0 0 0.0.0.0:51820 0.0.0.0:* -
udp 0 0 :::54863 :::* -
udp 0 0 :::51820 :::* -
DEBUG: Firewall rules
DEBUG: -t filter
Chain FORWARD (policy DROP 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 572 387K ACCEPT all -- * wg21 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
2 485 69163 ACCEPT all -- wg21 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 313 36059 ACCEPT all -- wg21 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
2 810 161K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:51820 /* WireGuard 'server' */
Chain OUTPUT (policy ACCEPT 363K packets, 226M bytes)
num pkts bytes target prot opt in out source destination
1 273 80148 ACCEPT all -- * wg21 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
DEBUG: -t nat
Chain PREROUTING (policy ACCEPT 28 packets, 3637 bytes)
num pkts bytes target prot opt in out source destination
1 8 561 WGDNS1 udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 /* WireGuard 'client1 DNS' */
2 0 0 WGDNS1 tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 /* WireGuard 'client1 DNS' */
3 1 176 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:51820 /* WireGuard 'server' */
Chain POSTROUTING (policy ACCEPT 19 packets, 1629 bytes)
num pkts bytes target prot opt in out source destination
1 4 597 MASQUERADE all -- * wg11 192.168.1.0/24 0.0.0.0/0 /* WireGuard 'client' */
Chain WGDNS1 (2 references)
num pkts bytes target prot opt in out source destination
1 8 561 DNAT all -- * * 192.168.1.0/24 0.0.0.0/0 /* WireGuard 'client1 DNS' */ to:202.87.221.198
DEBUG: -t mangle
Chain FORWARD (policy ACCEPT 237 packets, 25234 bytes)
num pkts bytes target prot opt in out source destination
1 22 3631 MARK all -- * wg11 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'client' */ MARK xset 0x1/0x7
2 2 120 TCPMSS tcp -- wg11 * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'client' */ TCPMSS clamp to PMTU
3 2 120 TCPMSS tcp -- * wg11 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'client' */ TCPMSS clamp to PMTU
4 572 387K MARK all -- * wg21 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */ MARK xset 0x1/0x7
5 19 1252 TCPMSS tcp -- wg21 * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'server' */ TCPMSS clamp to PMTU
6 19 1140 TCPMSS tcp -- * wg21 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'server' */ TCPMSS clamp to PMTU
Chain PREROUTING (policy ACCEPT 911 packets, 405K bytes)
num pkts bytes target prot opt in out source destination
1 138 143K MARK all -- wg11 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'client' */ MARK xset 0x1/0x7
2 799 105K MARK all -- wg21 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */ MARK xset 0x1/0x7
Use command 'diag sql [ table_name ]' to see the SQL data (might be many lines!)
Valid SQL Database tables: clients devices fwmark ipset policy servers session traffic
e.g. diag sql traffic will show the traffic stats SQL table
WireGuard ACTIVE Peer Status: Clients 1, Servers 1
1 = Update Wireguard modules 7 = Display QR code for a Peer {device} e.g. iPhone
2 = Remove WireGuard/wg_manager 8 = Peer management [ "list" | "category" | "new" ] | [ {Peer | category} [ del | show | add [{"auto="[y|n|p]}] ]
9 = Create Key-pair for Peer {Device} e.g. Nokia6310i (creates Nokia6310i.conf etc.)
3 = List ACTIVE Peers Summary [Peer...] [full] 10 = IPSet management [ "list" ] | [ "upd" { ipset [ "fwmark" {fwmark} ] | [ "enable" {"y"|"n"}] | [ "dstsrc"] ] } ]
4 = Start [ [Peer [nopolicy]...] | category ] e.g. start clients
5 = Stop [ [Peer... ] | category ] e.g. stop clients
6 = Restart [ [Peer... ] | category ] e.g. restart servers
? = About Configuration
v = View ('/jffs/addons/wireguard/WireguardVPN.conf')
e = Exit Script [?]
E:Option ==>