Replies: 11 comments 1 reply
-
Here is "/etc/wireguard/wg0.conf" file content: [Interface] [Peer] Here is the Wireguard Windows client config: [Interface] [Peer] |
Beta Was this translation helpful? Give feedback.
-
Hello, I am also facing the issue in setting up the Wireguard VPN on Oracle Cloud VM. =========================================== peer: peer: ==================== This is the Desktop client conf: [Peer] ==== Do you think it has something to do with the Firewall? |
Beta Was this translation helpful? Give feedback.
-
Oracle cloud has a firewall that has to be configured in their portal. Once you allow it, you should be able to use it just fine. I'm able to run it fine on Ubuntu 20.04. |
Beta Was this translation helpful? Give feedback.
-
@FireMasterK I have opened ports for Wireguard by adding ingress rules. Is there anything else to be done to configure the firewall on the Oracle side? By the way, I've also tried it with Ubuntu 20.04, same issue. |
Beta Was this translation helpful? Give feedback.
-
The script works perfectly for me like 6 months ago but not work for my new instances on Oracle cloud VM recently. Chain INPUT (policy ACCEPT) Chain FORWARD (policy ACCEPT) |
Beta Was this translation helpful? Give feedback.
-
Sorry I don't have enough knowledge about networking and I might need a bit more help. |
Beta Was this translation helpful? Give feedback.
-
@HosseinMarvi Hi, not necessarily all, I did it for those being added to Chain FORWARD only.
|
Beta Was this translation helpful? Give feedback.
-
@rayMomoko Thanks for your great help. It worked for me on a freshly installed Ubuntu 20.04. I should also mention that having OpenVPN installed before WireGuard was another reason that I couldn't solve the issue with this workaround. |
Beta Was this translation helpful? Give feedback.
-
Wish I found this sooner, I just solved this exact problem by studying the OpenVPN script's iptables setup and comparing to the WireGuard script is how I figured it out.. The script needs updating to include a rule to allow the incoming port for WireGuard, and setup the iptables rules to insert vs append, otherwise the user is being setup for failure. This is how the OpenVPN script here configures things and it works out of the box on Oracle Cloud + Ubuntu 20.04 (after allowing those ports in the Oracle Cloud public VCN settings of course). The formatting of the iptables rules in wg0.conf could be neater, one per line so its easy to read? |
Beta Was this translation helpful? Give feedback.
-
Thank you @rayMomoko , it worked for me. In my case I'm using it for LAN over VPN for Electrical Devices therefore no NAT is required, in my case the IP Tables are:
|
Beta Was this translation helpful? Give feedback.
-
I've tried everything, but no luck! |
Beta Was this translation helpful? Give feedback.
-
I have Wireguard VPN set up in Oracle Cloud VM (Ubuntu 18.04). Wireguard client (Windows) connects, but there is no internet. 0 bytes received, hundreds sent every other second.
Here are the things I've done and tried:
One thing I didn't understand in the process is why "net.ipv4.ip_forward=1" is still commented out inside "/etc/sysctl.conf" file after executing Angristan's script. Isn't it supposed to be enabled? Anyway, I tried to manually enable it in the file, still no internet.
I'm not good with Linux, Wireguard and networking stuff, so I'm hoping to get some help here on how to troubleshoot this issue.
Beta Was this translation helpful? Give feedback.
All reactions