[How-To] Stand Up WireGuard P2P between two sites
Overview of the Setup
-
JAX01 (Your Homelab):
- Network: Multiple VLANs.
- VPN VM: Will be connected to a dedicated VLAN for VPN traffic.
- Local Networks: Accessible alongside the VPN.
-
JAX02 (Friend’s Homelab):
- Network: Single non-VLAN network (
192.168.60.0/22
). - VPN VM: Connected to the main network.
- Local Networks: Accessible alongside the VPN.
- Network: Single non-VLAN network (
-
Objective:
- JAX01: Access both local VLANs and JAX02’s network without disrupting local internet traffic.
- JAX02: Access both local network and JAX01’s network without disrupting local internet traffic.
- Avoid DHCP Conflicts: Ensure that DHCP servers on both sides do not interfere with each other.
Prerequisites
-
Ubuntu 24.04 Server VMs:
- SITE01 VM: Connected to a local network.
- SITE02 VM: Connected to a local network.
-
Static IP Addresses:
- Ensure both VPN VMs have static IPs within their respective networks to maintain consistent VPN connectivity.
-
Firewall Access:
- Ensure that UDP port
51820
(default WireGuard port) is open on both networks' firewalls to allow VPN traffic.
- Ensure that UDP port
-
Access to Network Equipment:
- Ability to create and manage networks at both sites.
Step-by-Step Installation and Configuration
1. Install WireGuard on Both Servers
On Both SITE01 and SITE02 VPN VMs:
-
Update Package Lists:
-
Install WireGuard:
2. Generate WireGuard Keys
On Both Servers:
-
Generate Private and Public Keys:
- Files Created:
privatekey
: Keep this secure; never share.publickey
: Share this with your peer.
- Files Created:
-
Exchange Public Keys:
- SITE01's VPN VM Public Key: Send to SITE02’s VPN VM.
- SITE02's VPN VM Public Key: Send to SITE01’s VPN VM.
3. Configure WireGuard on Both Servers
SITE01 VPN VM Configuration:
-
Create WireGuard Configuration File:
-
Add the Following Configuration:
[Interface] PrivateKey = <JAX01_PrivateKey> Address = 10.6.0.5/24 ListenPort = 51820 SaveConfig = true [Peer] PublicKey = <JAX02_PublicKey> AllowedIPs = 192.168.60.0/22, 10.6.0.10/32 Endpoint = <JAX02_Public_IP>:51820 PersistentKeepalive = 25
- Replace:
<JAX01_PrivateKey>
: Content ofprivatekey
on JAX01.<JAX02_PublicKey>
: Public key from JAX02.<JAX02_Public_IP>
: Public IP or dynamic DNS of JAX02’s network.10.10.10.2
: IP assigned to JAX02’s VPN interface.
- Replace:
-
Enable IP Forwarding:
-
To make it persistent:
Add:
-
-
Set Up Firewall Rules (Using UFW as Example):
-
Start and Enable WireGuard:
JAX02 VPN VM Configuration:
-
Create WireGuard Configuration File:
-
Add the Following Configuration:
[Interface] PrivateKey = <JAX02_PrivateKey> Address = 10.6.0.10/24 ListenPort = 51820 SaveConfig = true [Peer] PublicKey = <JAX01_PublicKey> AllowedIPs = 10.5.40.0/22, 10.6.0.5/32 Endpoint = <JAX01_Public_IP>:51820 PersistentKeepalive = 25
- Replace:
<JAX02_PrivateKey>
: Content ofprivatekey
on JAX02.<JAX01_PublicKey>
: Public key from JAX01.<JAX01_Public_IP>
: Public IP or dynamic DNS of JAX01’s VPN VLAN interface.
- Replace:
-
Enable IP Forwarding:
-
To make it persistent:
Add:
-
-
Set Up Firewall Rules (Using UFW as Example):
-
Start and Enable WireGuard:
4. Configure Routing and Firewall Rules
On JAX01 (Your Homelab):
-
Configure Routing to Allow Access to JAX02’s Network:
- Assumption: Local VLANs are managed correctly, and routing is handled by the main router/firewall.
-
Add Routes for JAX02’s Network via VPN:
-
If using UFW, ensure that forwarding rules allow traffic between VLANs and WireGuard.
-
Example UFW Rules:
-
On JAX02 (Friend’s Homelab):
-
Configure Routing to Allow Access to JAX01’s Network:
-
Similar to JAX01, ensure that UFW allows traffic between the VPN and the local network.
-
Example UFW Rules:
-
5. Prevent DHCP Conflicts
Issue Experienced Previously: DHCP server at JAX02 took over JAX01’s network, disrupting home Wi-Fi.
Solution:
-
Isolate VPN Traffic: Use the dedicated VLAN on JAX01 for VPN traffic, ensuring that DHCP servers on JAX02 do not interfere with JAX01’s networks.
-
Ensure No DHCP is Advertised over the VPN:
- WireGuard should only handle traffic routing, not DHCP services.
- Verify that no DHCP server is running on the VPN interfaces.
Verify DHCP Services:
-
Check for DHCP Servers on JAX01 VPN Interface:
- Ensure that DHCP servers are not binding to the VPN VLAN interface (
eth0.10
).
- Ensure that DHCP servers are not binding to the VPN VLAN interface (
-
Check for DHCP Servers on JAX02 VPN Interface:
- Ensure that DHCP servers are not binding to the WireGuard interface (
wg0
).
- Ensure that DHCP servers are not binding to the WireGuard interface (
6. Adjust WireGuard AllowedIPs for Split Tunneling
Objective: Ensure that only traffic meant for the VPN tunnel goes through WireGuard, while local traffic uses the existing network routes.
JAX01 VPN VM Configuration:
-
AllowedIPs for JAX02’s Network:
-
This configuration ensures:
- Traffic destined for
192.168.60.0/22
(JAX02’s network) goes through the VPN. - Traffic destined for the WireGuard interface (
10.10.10.2
) is directly routed.
- Traffic destined for
JAX02 VPN VM Configuration:
-
AllowedIPs for JAX01’s Network:
-
This configuration ensures:
- Traffic destined for
10.10.10.0/24
(JAX01’s VPN VLAN) goes through the VPN. - Traffic destined for
192.168.60.0/22
(local network) uses the local route.
- Traffic destined for
Note: Avoid using 0.0.0.0/0
in AllowedIPs
to prevent all traffic from routing through the VPN, which could disrupt internet access.
7. Start and Enable WireGuard on Both Servers
On Both JAX01 and JAX02:
-
Enable and Start WireGuard:
-
Verify WireGuard Status:
- Expected Output:
- Interface details.
- Peers with correct public keys and allowed IPs.
- Expected Output:
8. Configure Proxmox VMs to Use the VPN
On JAX01:
-
Assign the VPN VM to the Dedicated VLAN:
- In Proxmox, edit the network settings of the VPN VM to connect to the bridge associated with VLAN
10
.
- In Proxmox, edit the network settings of the VPN VM to connect to the bridge associated with VLAN
-
Ensure Proper IP Assignment:
- The VPN VM should have an IP like
10.10.10.1/24
on the VLAN interface.
- The VPN VM should have an IP like
On JAX02:
-
Connect the VPN VM to the Main Network:
- Ensure the VPN VM is connected to the
192.168.60.0/22
network with a static IP (e.g.,192.168.60.10
).
- Ensure the VPN VM is connected to the
9. Testing the VPN Tunnel
From JAX01:
-
Ping JAX02’s VPN IP:
-
Access JAX02’s Local Network:
-
Access Local VLANs on JAX01:
- Ensure that accessing local VLANs on JAX01 works as before.
From JAX02:
-
Ping JAX01’s VPN IP:
-
Access JAX01’s Local VLANs:
-
Ensure Local Internet Access:
- Browse the internet or ping external sites to confirm traffic is using JAX02’s gateway.
10. Troubleshooting Tips
-
Check WireGuard Status:
- Ensure that peers are connected and data is being transferred.
-
Verify Firewall Rules:
- Ensure that UFW or other firewalls are not blocking VPN traffic.
- Use
sudo ufw status
to review current rules.
-
Check Routing Tables:
- Ensure that routes for the VPN are correctly set up and do not override default gateways.
-
Inspect Logs:
- Look for any errors or warnings related to WireGuard.
-
Ensure No IP Overlaps:
- Verify that the VPN IP ranges (
10.10.10.0/24
) do not overlap with any existing network ranges.
- Verify that the VPN IP ranges (
-
Restart WireGuard if Necessary:
11. Security Best Practices
-
Use Strong Keys:
- Ensure WireGuard keys are securely generated and stored.
-
Restrict AllowedIPs:
- Only allow necessary IP ranges through the VPN to minimize exposure.
-
Keep Systems Updated:
- Regularly update Ubuntu and WireGuard to patch any security vulnerabilities.
-
Monitor VPN Traffic:
- Use
sudo wg show
and other monitoring tools to keep an eye on VPN connections.
- Use
-
Backup Configurations:
- Keep backups of your WireGuard configurations and keys in a secure location.
Conclusion
By following this comprehensive guide, you should be able to establish a secure and efficient WireGuard VPN tunnel between your homelabs (JAX01 and JAX02). This setup ensures that:
- Local Network Access: Both locations can access each other’s local networks without interference.
- Internet Traffic: Internet-bound traffic remains routed through each respective site’s gateway, maintaining normal internet functionality.
- Network Isolation: The dedicated VLAN on JAX01 isolates VPN traffic, preventing DHCP conflicts and maintaining network stability.
Remember: Always verify configurations and test thoroughly to ensure network stability and security. If you encounter issues, refer back to the troubleshooting section or consult WireGuard’s official documentation for more advanced configurations.
Additional Resources:
- WireGuard Official Documentation
- Proxmox VE Networking
- OPNsense VLAN Setup (if applicable)
Feel free to reach out if you need further assistance or encounter specific issues during the setup process!
No Comments