This line indicates that your wireguard tunnel is not working on a lower level. Your router have sent out 1kB data and received 0B back. So, either this config file is terminated by your supplier or wgm got something wrong during the import.
Open the original config file in some text editor and compare with what you can see in wgm.
Please, also test this config file on windows, android, it's or something, just to check it's working
Hello Zeb, am bad I imported an old wg config, but now used same that is working my the Android phone, and noticed that all VPN clients have access to the internet but WAN has no access. please can you have a look again and advice why the WAN clients have no access. see new outputs for the 7 commands
interface: wg11 - output
public key: xxxxxx=
private key: (hidden)
listening port: 41479
peer: xxxxxx=
preshared key: (hidden)
endpoint: 50.7.114.51:250
allowed ips: 0.0.0.0/0
latest handshake: 1 minute, 19 seconds ago. (sec:79)
transfer: 85.10 MiB received, 5.44 MiB sent
persistent keepalive: every 25 seconds
ip rule - output
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9910: from 192.168.1.91 lookup main
9910: from 192.168.1.181 lookup main
9910: from 192.168.1.105 lookup main
9911: from 192.168.1.1/24 lookup 121
10010: from 192.168.1.91 lookup main
10011: from 192.168.1.105 lookup main
32766: from all lookup main
32767: from all lookup default
p route show table main - output
default via xx.xx.xx.1 dev eth0
10.50.1.0/24 dev wg21 proto kernel scope link src 10.50.1.1
10.50.1.2 dev wg21 scope link
50.7.114.51 via xx.xx.xx.1 dev eth0
xx.xx.xx.0/23 dev eth0 proto kernel scope link src xx.xx.xx.xx
xx.xx.xx.1 dev eth0 proto kernel scope link
127.0.0.0/8 dev lo scope link
192.168.1.0/24 dev br0 proto kernel scope link src 192.168.1.1
208.67.220.220 via xx.xx.xx.1 dev eth0 metric 1
208.67.222.222 via xx.xx.xx.1 dev eth0 metric 1
ip route show table 121 - output
0.0.0.0/1 dev wg11 scope link
128.0.0.0/1 dev wg11 scope link
192.168.1.0/24 dev br0 proto kernel scope link src 192.168.1.1
iptables -nvL PREROUTING -t nat - output
Chain PREROUTING (policy ACCEPT 1233 packets, 201K bytes)
pkts bytes target prot opt in out source destination
741 50469 WGDNS1 udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 /* WireGuard 'client1 DNS' */
0 0 WGDNS1 tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 /* WireGuard 'client1 DNS' */
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:51820 /* WireGuard 'server' */
0 0 ACCEPT all -- eth0 * 0.0.0.0/0 224.0.0.0/4
4329 429K GAME_VSERVER all -- * * 0.0.0.0/0 xx.xx.xx.xx
4329 429K VSERVER all -- * * 0.0.0.0/0 xx.xx.xx.xx
iptables -nvL WGDNS1 -t nat - output
Chain WGDNS1 (2 references)
pkts bytes target prot opt in out source destination
751 51281 DNAT all -- * * 192.168.1.0/24 0.0.0.0/0 /* WireGuard 'client1 DNS' */ to:10.100.0.1
iptables -nvL FORWARD - output
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- eth0 * 0.0.0.0/0 224.0.0.0/4
2074K 2130M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 WGM_ACL_F all -- wg+ * 0.0.0.0/0 0.0.0.0/0 /* Wireguard ACL */
0 0 ACCEPT all -- br0 wg21 0.0.0.0/0 0.0.0.0/0 /* LAN to WireGuard 'server clients' */
0 0 ACCEPT all -- wg21 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
30216 9462K OVPNSF all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 other2wan all -- !br0 eth0 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- br0 br0 0.0.0.0/0 0.0.0.0/0
1505 85262 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
28711 9376K NSFW all -- * * 0.0.0.0/0 0.0.0.0/0
28711 9376K ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT
0 0 OVPNCF all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 VPNCF all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0