Issues with Wireguard tunnel between RUT200 and FritzBox 7530

Hey,

I fail to connect my FritzBox at home with a remote RUT200 via wireguard VPN. I have basic understanding of networking and debugging using a unix cli. I have read many forums and articles on the web, but I seem to miss something… Can you point me in the right direction?

Sorry for the long post, but I try to give all available information instead of just asking an open question:D I tried to disguise any information, which might be risky to publish on the web. I hope the naming is unambiguous.

I use a fritzbox 7530 at home creating a network 192.168.188.0/24. There is a influx database connected to this network I use for collecting data. I have a remote location generating data. I used a fritzbox 6820 at the remote location for about a year, which is connected to the internet via lte and which was connected to my fritzbox at home via wireguard vpn. Unfortunately, the lte modem of the 6820 failed regularly and did not recover without manual intervention making it useless. So I bought a RUT200. Connecting the two fritzboxes was very simple. Establishing the wireguard VPN tunnel for the RUT 200 seems to be impossible for me :frowning:

My home network is 192.168.188.0/24. The remote network is 192.168.178.0/24. As far understood various articles and forum posts, a third network is required for the vpn tunnel, which I set to 192.168.179.0/24.

Here the configuration of the FritzBox and the RUT 200. Any information not given is empty.

FritzBox
My FritzBox UI is set to German. So I translated many terms. I hope you can follow.

Online Monitor:

  • Internet IPv4 and IPv6 adress → Dual Stack

WireGuard VPN:

  • web ui
    • There is a public key mentioned, which is not listed in the config file. It doesn’t say, what this key is relevant for.
    • There is some more information on the web ui, which is identical to the content of the config file as well: preshared key, address of my fritzbox, remote network
    • I didn’t tick the following fields: route all IPv4 traffic via VPN tunnel, allow netBios over this link, only certain devices shall be reachable via this tunnel
  • IP Network address fritzBox: 192.168.188.1

config file

  • The config file can be exported only directly after setting up the tunnel. At a later point in time, only the information given above is displayed on the webUI. I can’t change any keys or IP addresses after creation of the setup.

  • [Interface]
    PrivateKey = interfacePrivateKeyGeneratedByFritzbox
    Address = 192.168.179.1/24
    DNS = 192.168.188.1
    DNS = fritz.box

  • [Peer]
    PublicKey = peerPublicKeyGeneratedByFritzbox
    PresharedKey = peerPresharedKeyGeneratedByFritzbox
    AllowedIPs = 192.168.188.0/24
    Endpoint = asdf.myfritz.net:589298
    PersistentKeepalive = 25

Teltonika RUT200

Since I fiddled around for a while, I started with a clean factory reset In the configuration wizard, I set the address of the RUT200 to 192.168.178.1.

The firmware is up to date.

The first time, I tried to set the VPN up, I had issues accessing the fritz box via its endpoint address via IPv6. So I disabled IPv6. This made the error of not reaching the fritz box to change. The error in logread was: “user.notice wireguard_monitor: VpnHome endpoint asdf.myfritz.net:58298 is not responding for 1772318880 seconds, restarting”. Trying to ping the endpoint address with an online IPv6 UDP port scanner revealed, that the fritzbox is not reachable via IPv6. I deactivated IPv6 by going to Network → WAN → mob1s1a1 → Edit → PDP type → select IPv4 from the dropdown menu instead of IPv4/IPv6

here the setup of the wireguard vpn tunnel:

  • general settings
    • enable: on
    • private key: generalSettingsPrivateKeyGeneratedByRut
    • public key: generalSettingsPublicKeyGeneratedByRut
    • IP address: 192.168.179.1/24
  • advanced settings
    • listen port: 51820
    • MTU: 1280
  • Peer settings
    • General settings
      • public key: peerPublicKeyGeneratedByFritzbox
      • endpoint host: asdf.myfritz.net
      • Allowed IPs: 192.168.179.2/32
        192.168.188.0/24
      • rout allowed IPs: on
    • Advanced settings:
      • Tunnel source: Any
      • pre-shared key: peerPresharedKeyGeneratedByFritzbox
      • Endpoint port: 58298
      • persistend keep alive: 25
    • QR settings
      • I haven’t changed anything here;)
      • server IP: MOB1S1A1 IPv4 (some IP-Address)
      • tunnel addresses: 192.168.179.2/32
      • peer alllowed IPs: All IPv4 (0.0.0.0)/0
        All IPv6 (::/0)

After setting up the vpn tunnel on the RUT200 I checked the firewall zones:

  • lan => wan wireguard
    • Input accept
    • Output accept
    • Forwarding inside zone accept
    • Masquerading off
  • wan => Reject
    • I suppose, this it not relevant for my VPN problem
  • wireguard => lan
    • Input accept
    • Output accept
    • Forwarding inside zone accept
    • Masquerading on

here some output from the cli, which has been posted in other threats. I can’t find any helpful information in the results

root@RUT200:~# logread | tail -n 20
1046 Mon Mar 2 20:17:09 2026 daemon.info dnsmasq-dhcp[16261]: DHCPREQUEST(br-lan) 192.168.178.151 f8:59:71:b1:4a:22
1047 Mon Mar 2 20:17:09 2026 daemon.info dnsmasq-dhcp[16261]: DHCPACK(br-lan) 192.168.178.151 f8:59:71:b1:4a:22 johannes-Latitude-7480
1048 Mon Mar 2 20:17:09 2026 daemon.info hostapd: wlan0-1: STA f8:59:71:b1:4a:22 WPA: pairwise key handshake completed (RSN)
1049 Mon Mar 2 20:17:09 2026 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED f8:59:71:b1:4a:22
1050 Mon Mar 2 20:17:10 2026 network.info Leased 192.168.178.151 IP address for client f8:59:71:b1:4a:22 - johannes-Latitude-7480 in WiFi
1051 Mon Mar 2 20:17:15 2026 authpriv.info dropbear[31634]: Child connection from 192.168.178.151:58450
1052 Mon Mar 2 20:17:15 2026 authpriv.info dropbear[31634]: Exit before auth from <192.168.178.151:58450>: Exited normally
1053 Mon Mar 2 20:17:24 2026 authpriv.info dropbear[31639]: Child connection from 192.168.178.151:45446
1054 Mon Mar 2 20:17:29 2026 authpriv.notice dropbear[31639]: Password auth succeeded for ‘root’ from 192.168.178.151:45446
1055 Mon Mar 2 20:17:29 2026 connections.notice SSH: Password auth succeeded for root on SSH from 192.168.178.151:45446
1056 Mon Mar 2 20:18:00 2026 cron.err crond[6082]: USER wireguard pid 32174 cmd /usr/bin/wireguard_watchdog
1057 Mon Mar 2 20:18:01 2026 user.notice wireguard_monitor: VpnHome endpoint ``asdf.myfritz.net:58298`` is not responding for 1772479081 seconds, restarting
1058 Mon Mar 2 20:18:03 2026 daemon.notice netifd: Network device ‘VpnHome’ link is down
1059 Mon Mar 2 20:18:03 2026 daemon.notice netifd: VpnHome (32210): RTNETLINK answers: File exists
1060 Mon Mar 2 20:18:03 2026 daemon.notice netifd: Interface ‘VpnHome’ is now down
1061 Mon Mar 2 20:18:03 2026 daemon.notice netifd: Interface ‘VpnHome’ is setting up now
1062 Mon Mar 2 20:18:05 2026 user.notice wireguard: added watchdog cron job
1063 Mon Mar 2 20:18:07 2026 daemon.notice netifd: Interface ‘VpnHome’ is now up
1064 Mon Mar 2 20:18:07 2026 daemon.notice netifd: Network device ‘VpnHome’ link is up
1065 Mon Mar 2 20:18:09 2026 user.notice firewall: Reloading firewall due to ifup of VpnHome (VpnHome)

root@RUT200:~# ip rout
default dev usb0 proto static scope link src 10.237.62.219 metric 3
10.237.62.219 dev usb0 proto static scope link src 10.237.62.219 metric 3
192.168.178.0/24 dev br-lan proto kernel scope link src 192.168.178.1
192.168.179.0/24 dev VpnHome proto kernel scope link src 192.168.179.1
192.168.179.2 dev VpnHome proto static scope link
192.168.188.0/24 dev VpnHome proto static scope link

root@RUT200:~# wg show all dump
VpnHome generalSettingsPrivateKeyGeneratedByRut generalSettingsPublicKeyGeneratedByRut 51820 off
VpnHome peerPublicKeyGeneratedByFritzbox peerPresharedKeyGeneratedByFritzbox 77.179.241.51:58298 192.168.179.2/32,192.168.188.0/24 0 0 444 25

What am I missing?

Windy

Hello,

Can you do a tcpdump -i any -n -v ‘port 58298’ on the FB ?

Do you see something ? If yes the most probable cause of the failure is a bad key somewhere.

Hey,

thanks for the support!
Does the fritzbox provide a cli or ssh? I couldn’t find any information about how to run tcpdump. Instead I found a ui FRITZ!Box, where I could dump traffic. There are several interfaces to select from. Below the headline “internet”, I see:

    1. internet connection
  • Routing interface
  • Interface 1 (‘avm-ipsec’)
  • Interface 2 (‘avm-wg’)
  • Interface 0 (‘internet’)
    1. internet connection
    1. internet connection

I ran the dump on 1. internet connection, routing interface and interface 0. All dumped files contained some information on the requesting the handshake by the RUT 200. Here some of the lines:

No. Time Source Destination Protocol Length Info
1281 39.958673 77.187.180.201 62.109.121.1 DNS 101 Standard query 0xff64 A community.teltonika.lt OPT
1282 39.959198 77.187.180.201 62.109.121.1 DNS 101 Standard query 0xc88f AAAA community.teltonika.lt OPT
1286 39.974815 62.109.121.1 77.187.180.201 DNS 220 Standard query response 0xc88f AAAA community.teltonika.lt CNAME ``alb-prod-157531050.eu-central-1.elb.amazonaws.com`` AAAA 2a05:d014:2eb:6e40:8dbd:96ac:a7aa:9042 AAAA 2a05:d014:2eb:6e41:a5b4:4f03:651a:b406 OPT
1287 39.976184 62.109.121.1 77.187.180.201 DNS 196 Standard query response 0xff64 A community.teltonika.lt CNAME ``alb-prod-157531050.eu-central-1.elb.amazonaws.com`` A 63.178.151.212 A 63.178.214.255 OPT
1307 42.845696 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x5B7256EE
1310 44.385452 77.187.180.201 216.239.35.0 NTP 98 NTP Version 4, client
1311 44.401724 216.239.35.0 77.187.180.201 NTP 98 NTP Version 4, server

2254 82.337518 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x0742E9FF
2267 83.051671 77.187.180.201 61.8.132.2 ISAKMP 130 INFORMATIONAL MID=263 Initiator Request
2268 83.070474 61.8.132.2 77.187.180.201 ISAKMP 130 INFORMATIONAL MID=263 Responder Response
2549 86.004225 77.187.180.201 61.8.132.2 UDPENCAP 51 NAT-keepalive
2552 87.405658 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x3051163C
2567 92.446708 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x9ECC6E92
2574 94.047160 198.98.51.118 77.187.180.201 SIP 457 Request: OPTIONS ``sip:100@77.187.180.201`` |
2865 97.884446 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x66B0AECF
2885 100.231486 77.187.180.201 62.109.121.1 DNS 101 Standard query 0x9377 A community.teltonika.lt OPT
2886 100.232143 77.187.180.201 62.109.121.1 DNS 101 Standard query 0xd8ae AAAA community.teltonika.lt OPT
2888 100.236899 77.187.180.201 62.109.121.1 DNS 101 Standard query 0x78b4 HTTPS community.teltonika.lt OPT
2894 100.249863 62.109.121.1 77.187.180.201 DNS 196 Standard query response 0x9377 A community.teltonika.lt CNAME ``alb-prod-157531050.eu-central-1.elb.amazonaws.com`` A 63.178.214.255 A 63.178.151.212 OPT
2895 100.253744 62.109.121.1 77.187.180.201 DNS 248 Standard query response 0x78b4 HTTPS community.teltonika.lt CNAME ``alb-prod-157531050.eu-central-1.elb.amazonaws.com`` SOA ``ns-1689.awsdns-19.co.uk`` OPT
2899 100.257396 77.187.180.201 62.109.121.1 DNS 128 Standard query 0x139c HTTPS ``alb-prod-157531050.eu-central-1.elb.amazonaws.com`` OPT
2901 100.259428 62.109.121.1 77.187.180.201 DNS 220 Standard query response 0xd8ae AAAA community.teltonika.lt CNAME ``alb-prod-157531050.eu-central-1.elb.amazonaws.com`` AAAA 2a05:d014:2eb:6e40:8dbd:96ac:a7aa:9042 AAAA 2a05:d014:2eb:6e41:a5b4:4f03:651a:b406 OPT
2906 100.266488 62.109.121.1 77.187.180.201 DNS 212 Standard query response 0x139c HTTPS ``alb-prod-157531050.eu-central-1.elb.amazonaws.com`` SOA ``ns-1689.awsdns-19.co.uk`` OPT
2928 103.645682 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x7B805544
3226 108.697686 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x313E81A2
3227 111.385305 77.187.180.201 216.239.35.0 NTP 98 NTP Version 4, client
3228 111.401756 216.239.35.0 77.187.180.201 NTP 98 NTP Version 4, server
3238 113.884411 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x847A8420
3239 115.385128 77.187.180.201 216.239.35.4 NTP 98 NTP Version 4, client
3240 115.401742 216.239.35.4 77.187.180.201 NTP 98 NTP Version 4, server
3241 116.005369 77.187.180.201 61.8.132.2 UDPENCAP 51 NAT-keepalive
3512 119.645460 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x9C1E3740
3527 124.764366 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0xBB89653D
3530 125.385540 77.187.180.201 216.239.35.12 NTP 98 NTP Version 4, client
3531 125.401987 216.239.35.12 77.187.180.201 NTP 98 NTP Version 4, server
3836 130.524281 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0xA7D6D370
3846 133.491722 77.187.180.201 144.76.43.40 NTP 98 NTP Version 4, client
3847 133.506379 144.76.43.40 77.187.180.201 NTP 98 NTP Version 4, server
3861 136.285771 61.8.155.90 77.187.180.201 WireGuard 198 Handshake Initiation, sender=0x44286DFA

I guess that means, the request for the handshake send by the RUT 200 is received by the fritzbox. Filtering for the port didn’t reveal anything.

I forgot one relevant detail: I setup several wireguard VPNs for my laptop and my phone, which work perfectly fine. Their setup on the peer device required the config file from my fritzbox. So the fritzbox setup for wireguard should be fine.

Windy

OK, the FB receives handshake requests from the RUT. The network path is clean.

Are the packets accepted by the wg layer ? Check with wg (without options) what are the values of the counters ?

If the they stay at 0 then you have at least one key mismatch.

This is the result of wg:

root@RUT200:~# wg
interface: VpnHome
public key: generalSettingsPrivateKeyGeneratedByRut
private key: (hidden)
listening port: 51820

peer: peerPublicKeyGeneratedByFritzbox
preshared key: (hidden)
endpoint: 77.187.180.201:58298
allowed ips: 192.168.179.2/32, 192.168.188.0/24
transfer: 0 B received, 444 B sent
persistent keepalive: every 25 seconds

So many requests send, but nothing received. I’m not sure, what you mean with “Are the y accepted by the wg layer ?”. Does the result above answer this question?

Concerning the keys: Under “general settings” on the RUT, a key pair is generated, which is not known to the fritzbox. Does the RUT provide the public key to the fritzbox for what ever signature or encryption purpose after the tunnel is established successfully? There is one key shown on the fritzbox UI, which is labled as public key but which is not included in the config file Thus, I assume, this key can’t be relevant, since e.g. I configured a wireguard tunnel on my phone based on the config file without entering the public key from the fritzbox web ui.

I triple checked all keys. I assume, they are correct and don’t contain trailing white space characters…

Greetings,

The interface IP addresses on the RUT200 and the FritzBox should not be the same. Please change the RUT200’s WireGuard IP address to 192.168.179.2/24.

After that, update the Allowed IPs on the RUT200 to 192.168.179.1/32

Is there a private key included in the configuration file? If so, have you tried using it as the private key on the RUT200?

Best Regards,
Justinas

Identical (and wrong !) IP addresses at each end won’t prevent the tunnel from coming up.

Data exchange will obviously fail but this is another subject.

What is the output of wg on the FB ? Do you have any way to see the transfer counters ?

Fixing the ip adresses of the interface did not yet solve the issue. But its for sure a pice of the puzzle.

If I did use the private key from the fritzbox config file in the general settings of the setup on the RUT, wouldn’t this corrupt the key pair? I’ll copy the original key to be able to restore it later and try the key from the config file.

Unfortunately, there is no cli on the fritzbox. I’ll try to figure out, if there is a way to read the count of attempt handshakes.

Thanks alot for your effort!

No, but you will need both the private and corresponding public keys.

To be sure to have a clean config: generate everything at one point (the FB) and import all the required keys on the RUT.

It works!!! Thanks alot.

So what I did is put the public key from the fritzbox web ui and the private key from the config file under [Interface] and entered it in the general settings tab.

So there were basically three issues:

  • The RUT200 resolved the endpoint address via IPv4, but the fritzbox is reachable via IPv4 only. I figured this out by a IPv6 udp port scan with a online tool
  • I gave the fritzbox and the RUT the same IP address for the tunnel. They need different IP adresses
  • The public and private key of the interface defined in the RUT settings need to be the keys generated by the fritzbox. The public key is displayed in the web UI, the private key is listed in the config file under [Interface]

This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.