tried forwarding the required Port from ISP router to DD-WRT router.Ĭhain INPUT (policy ACCEPT 21099 packets, 2536K bytes).Iptables -t nat -I PREROUTING -i br0 -p udp -dport 8246 -j DNAT -to-destination 192.168.1.155 Iptables -t nat -I PREROUTING -i br0 -p tcp -dport 8246 -j DNAT -to-destination 192.168.1.155 Iptables -t nat -I POSTROUTING -o br0 -j SNAT -to $(nvram get lan_ipaddr) *Then follower your well written and much appreciated guide hereto setup WG on client. *after hard reset followed this guide to setup wap. I made a hard reset and started from scratch, this time i changed the configuration from 'client' to 'WAP' to benefit for one subnet for all devices, what i did: I don't want to exclude the PBX server as the main idea is to bypass ISP's deep packet inspection firewall. Sorry i forgot mentioning that am using DD-WRT r48646. when you post always mention not only router model but also build number so that we can give optimal support (note depending on router and setup and in rare cases, the WAN might not be available after a restart of the router and you have to hit Apply on the WireGuard setup page) if you have setup Torguard correctly to forward the port on their servers) with:īut actually a better approach might be to use Policy Based routing to exclude the telephony server from the VPN, you can use the IP or even the port to route via the WAN. Test this script from the command line and if it works: Administration/Commands and Save as Firewallįurthermore Disable CVE mitigation in the GUI and probably disable SFE (Shortcut Forwarding Engine) on Setup page.Ĭheck if the port forward rules are hit (e.g. To elaborate on this (excellent) answer, if you decide to go the port forward route then Disable SFE on setup page (it adds a lot of latency ) and disable CVE mitigation. In ether case, packets must go out the same route it came in. You can exclude the Telephony from the VPN and let it out directly on the WAN with PBR. The port must also be forwarded at the Torguard server. Iptables -I FORWARD -p tcp -d $int_ip -dport $int_port -j ACCEPT Iptables -t nat -I PREROUTING -p tcp -d $(nvram get oet1_ipaddr) -dport $ext_port -j DNAT -to $int_ip:$int_port The port is forwarded from DD-wrt to the telephony server, tried both the port forwarding under 'NAT/qos' option and setting firewall script: The port is forwarded from DSL router to DD-wrt and even tried putting dd-wrt on DMZ once. When i test port forwarding with Torguard Windows client app on PC it works well, but not when connecting through DD-WRT wireguard. The issue is i have a telephony server which require an open port 8246, I have TP-Link ARCHER-C7 with DD-wrt on it and its behind DSL router, the dd-wrt router is running as wireguard VPN client, where the VPN service is provided from Torguard.Īll connected devices are getting internet through VPN and working well. Posted: Sun 9:23 Post subject: Wireguard port forwarding
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |