root@DD-WRT:~# grep -E -i 'oet|wireguard' /var/log/messages
Jan 1 01:00:05 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
Jan 1 01:00:13 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:46:34 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:47:23 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:47:30 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:47:35 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:48:33 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:48:33 DD-WRT user.info root: Enable WireGuard interface oet1 on port 51810
May 8 16:48:34 DD-WRT user.info root: WireGuard 10.4.0.1/24 added to oet1
May 8 16:48:34 DD-WRT user.info root: WireGuard acquiring /tmp/oet.lock for 4094
May 8 16:48:34 DD-WRT user.info root: WireGuard /tmp/oet.lock acquired for 4094
May 8 16:48:34 DD-WRT user.info root: WireGuard waited 1 seconds to set routes for oet
May 8 16:48:35 DD-WRT user.info root: WireGuard PBR via oet1 table 21
May 8 16:48:35 DD-WRT user.info root: WireGuard PBR 192.168.147.0/24:IPv4 via oet1 table 21
May 8 16:48:35 DD-WRT user.info root: WireGuard route 10.4.0.2/24 added via oet1
May 8 16:48:35 DD-WRT user.info root: WireGuard route 192.168.147.0/24 added via oet1
May 8 16:48:36 DD-WRT user.info root: WireGuard IPv4 internet access for 10.4.0.1/24 enabled
May 8 16:48:37 DD-WRT user.info root: WireGuard adding local routes to table 21
May 8 16:48:37 DD-WRT user.info root: WireGuard Inbound Firewall deactivated on oet1
May 8 16:48:37 DD-WRT user.info root: WireGuard released /tmp/oet.lock for 4094
root@DD-WRT:~# ip -6 route show
::/1 dev oet1 metric 1024
fe80::/64 dev eth0 metric 256
ff00::/8 dev eth0 metric 256
8000::/1 dev oet1 metric 1024
unreachable default dev lo metric -1 error -128
2a07:3740:6440::/64 dev vlan2 metric 256 expires 2591879sec
fe80::/64 dev eth0 metric 256
fe80::/64 dev br0 metric 256
fe80::/64 dev vlan1 metric 256
fe80::/64 dev vlan2 metric 256
default via fe80::62f1:8aff:fe3b:8669 dev vlan2 metric 1024 expires 1679sec
default dev vlan2 metric 2048
unreachable default dev lo metric -1 error -128
ff00::/8 dev eth0 metric 256
ff00::/8 dev br0 metric 256
ff00::/8 dev vlan1 metric 256
ff00::/8 dev vlan2 metric 256
unreachable default dev lo metric -1 error -128
root@DD-WRT:~# grep -E -i 'oet|wireguard' /var/log/messages
Jan 1 01:00:15 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
Jan 1 01:00:29 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:47:09 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:51:31 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:51:31 DD-WRT user.info root: Enable WireGuard interface oet1 on port 51820
May 8 16:51:31 DD-WRT user.info root: WireGuard 10.4.0.2/24 added to oet1
May 8 16:51:31 DD-WRT user.info root: WireGuard acquiring /tmp/oet.lock for 3048
May 8 16:51:31 DD-WRT user.info root: WireGuard /tmp/oet.lock acquired for 3048
May 8 16:51:31 DD-WRT user.info root: WireGuard waited 1 seconds to set routes for oet
May 8 16:51:31 DD-WRT user.info root: WireGuard PBR via oet1 table 21
May 8 16:51:31 DD-WRT user.info root: WireGuard PBR 192.168.146.0/24:IPv4 via oet1 table 21
May 8 16:51:32 DD-WRT user.info root: WireGuard route 10.4.0.1/24 added via oet1
May 8 16:51:32 DD-WRT user.info root: WireGuard route 192.168.146.0/24 added via oet1
May 8 16:51:33 DD-WRT user.info root: WireGuard NAT via oet1 for 10.4.0.2 enabled
May 8 16:51:33 DD-WRT user.info root: WireGuard IPv4 internet access for 10.4.0.2/24 enabled
May 8 16:51:33 DD-WRT user.info root: WireGuard adding local routes to table 21
May 8 16:51:33 DD-WRT user.info root: WireGuard Inbound Firewall deactivated on oet1
May 8 16:51:33 DD-WRT user.info root: WireGuard released /tmp/oet.lock for 3048
May 8 16:52:28 DD-WRT user.info root: WireGuard number of non failed tunnels in fail set: 0
May 8 16:52:29 DD-WRT user.info root: Flush delete PBR interface oet1, table : 21
May 8 16:52:29 DD-WRT user.info root: Enable WireGuard interface oet1 on port 51810
May 8 16:52:29 DD-WRT user.info root: Establishing WireGuard tunnel with peer endpoint 2a07:****:****:*:****:****:****:8335:51810
May 8 16:52:29 DD-WRT user.info root: WireGuard experimental endpoint routing for oet1 to endpoint 2a07:****:****:*:****:****:****:8335:51810 is IPv6: [2a07:****:****:*:****:****:****:8335]
May 8 16:52:29 DD-WRT user.info root: WireGuard 10.4.0.2/24 added to oet1
May 8 16:52:29 DD-WRT user.info root: WireGuard acquiring /tmp/oet.lock for 3984
May 8 16:52:29 DD-WRT user.info root: WireGuard /tmp/oet.lock acquired for 3984
May 8 16:52:29 DD-WRT user.info root: WireGuard waited 1 seconds to set routes for oet
May 8 16:52:29 DD-WRT user.info root: WireGuard PBR via oet1 table 21
May 8 16:52:29 DD-WRT user.info root: WireGuard PBR 192.168.146.0/24:IPv4 via oet1 table 21
May 8 16:52:29 DD-WRT user.info root: WireGuard route 10.4.0.1/24 added via oet1
May 8 16:52:29 DD-WRT user.info root: WireGuard route 192.168.146.0/24 added via oet1
May 8 16:52:31 DD-WRT user.info root: WireGuard adding local routes to table 21
May 8 16:52:31 DD-WRT user.info root: WireGuard released /tmp/oet.lock for 3984
May 8 16:52:31 DD-WRT user.info root: WireGuard IPv4 internet access for 10.4.0.2/24 enabled
May 8 16:52:31 DD-WRT user.info root: WireGuard Inbound Firewall deactivated on oet1
root@DD-WRT:~# ip -6 route show
2a07:****:****:*:****:****:****:8335 via fe80::62f1:8aff:fe3b:8669 dev vlan2 metric 1024
::/1 dev oet1 metric 1024
fe80::/64 dev eth0 metric 256
ff00::/8 dev eth0 metric 256
8000::/1 dev oet1 metric 1024
default via fe80::62f1:8aff:fe3b:8669 dev vlan2 metric 1024
unreachable default dev lo metric -1 error -101
2a07:****:****:*:****:****:****:8335 via fe80::62f1:8aff:fe3b:8669 dev vlan2 metric 1024
2a07:3740:6440::/64 dev vlan2 metric 256 expires 2591831sec
fe80::/64 dev eth0 metric 256
fe80::/64 dev vlan1 metric 256
fe80::/64 dev eth1 metric 256
fe80::/64 dev eth2 metric 256
fe80::/64 dev br0 metric 256
fe80::/64 dev vlan2 metric 256
default via fe80::62f1:8aff:fe3b:8669 dev vlan2 metric 1024 expires 1631sec
default dev vlan2 metric 2048
unreachable default dev lo metric -1 error -101
ff00::/8 dev eth0 metric 256
ff00::/8 dev vlan1 metric 256
ff00::/8 dev eth1 metric 256
ff00::/8 dev eth2 metric 256
ff00::/8 dev br0 metric 256
ff00::/8 dev vlan2 metric 256
unreachable default dev lo metric -1 error -101
I am confused by the fact that you have only ipv6 from isp, but then you are trying to use that to create an ipv4 network address. Not saying that it is the problem, but there will be nuances in the configuration that need to be taken into account.
Posted: Fri May 12, 2023 13:37 Post subject: Re: Wireguard site-to-site setup
markush6302 wrote:
Hello!
I'm trying to connect to ddwrt devices (both running v3.0-r52459 std) with Wireguard over ipv6 (I only get an ipv6 address from my isp).
Here are my logs:
Site A, TP-Link TL-WDR3600 v1, Subnet 192.168.146.0/24:
Site B, Linksys EA6700, Subnet 192.168.147.0/24:
Wildlion wrote:
I am confused by the fact that you have only ipv6 from isp, but then you are trying to use that to create an ipv4 network address. Not saying that it is the problem, but there will be nuances in the configuration that need to be taken into account.
Both devices must support a 6to4 tunnel or use ipv6 only, perhaps(?). _________________ "The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep." - Robert Frost
"I am one of the noticeable ones - notice me" - Dale Frances McKenzie Bozzio