Makes sense as I have no internet and no handshake.
Also tried with metric 8 and same mtu limit you use. Only other difference is routing allowed Ips off. Tried changing that for good measure, but no change (and that killed my internet already in the first stages of this process)
Interesting. After a zillion typos from me I copypasted your line to get it right and … nothing. Just a new prompt. Which I assume means command has been executed with nil results.
With my error rates in simple typing I think it’s probably better to postpone the tcpdump installation/operation. I’ll be back tomorrow to try this and any other ideas you might have. Thank you for today.
Again, apologies for a wall of output but here you are.
For good measure and control I repeat ifconfig for residwg & peer.
Four notes:
The web UI seems to override the commands given through the CLI. I fooled around a bit an after ubus down it was still listed as active in the web UI. I then shut it down in the web UI and it could not be found from the CLI when I tried to start it. This is why you have a series of ups/downs in the printout below - I was checking.
As always with route allowed IPs turned on there is no handshake and no internet at all.
Metric of residwg is 1 in the ifconfig residwg printout in spite of it being 8 in the configuration file printout.
ip -4 route show dev residwg table 48574 gets no reply.
Hope this helps you see something.
/T
config interface ‘residwg’
option proto ‘wireguard’
option private_key (EDITED)
option public_key (EDITED)
option listen_port ‘48574’
option mtu ‘1280’
option metric ‘8’
list dns ‘98.128.186.86’
list dns ‘155.4.89.136’
list addresses ‘10.0.138.123/24’
option disabled ‘1’
config wireguard_residwg ‘resipeer’
option endpoint_port ‘48574’
option public_key (EDITED)
option persistent_keepalive ‘25’
option endpoint_host (NAME OF SERVER)
option route_allowed_ips ‘1’
list allowed_ips ‘0.0.0.0/1’
list allowed_ips ‘128.0.0.0/1’
root@RUTX10:~# wg
interface: residwg
root@RUTX10:~# ubus call network.interface.residwg down
root@RUTX10:~# ubus call network.interface.residwg up
root@RUTX10:~# wg
interface: residwg
root@RUTX10:~# ubus call network.interface.residwg down
-ash: ubus: not found
root@RUTX10:~# ubus call network.interface.residwg down
root@RUTX10:~# wg
root@RUTX10:~# ubus call network.interface.residwg up
root@RUTX10:~# wg
interface: residwg
root@RUTX10:~#
root@RUTX10:~# ip -4 route show
default via 192.168.1.1 dev eth1 proto static src 192.168.1.2 metric 2
192.168.1.0/24 dev br-lan proto static scope link metric 1
192.168.1.0/24 dev eth1 proto static scope link metric 2
root@RUTX10:~# ip -4 rule show
0: from all lookup local
2061: from all fwmark 0x3d00/0x3f00 blackhole
2062: from all fwmark 0x3e00/0x3f00 unreachable
32766: from all lookup main
32767: from all lookup default
root@RUTX10:~# ip -4 route show dev residwg table 48574
root@RUTX10:~# ip -4 route show
default via 192.168.1.1 dev eth1 proto static src 192.168.1.2 metric 2
192.168.1.0/24 dev br-lan proto static scope link metric 1
192.168.1.0/24 dev eth1 proto static scope link metric 2
root@RUTX10:~# ip -4 route show dev residwg table 48574
root@RUTX10:~#
I suspect ther may be something else at play here, I just don’t know what. Could you try to do the same using the static route workaround ? No need to clear /etc/mwan3.user just put a return at the beginning.
root@RUTX10:~# ip -4 route show
default via 192.168.1.1 dev eth1 proto static src 192.168.1.2 metric 2
10.0.138.123 dev eth1 proto static scope link metric 2 mtu 1400
192.168.1.0/24 dev br-lan proto static scope link metric 1
192.168.1.0/24 dev eth1 proto static scope link metric 2
root@RUTX10:~# ip -4 rule show
0: from all lookup local
2061: from all fwmark 0x3d00/0x3f00 blackhole
2062: from all fwmark 0x3e00/0x3f00 unreachable
32766: from all lookup main
32767: from all lookup default
root@RUTX10:~# ip -4 rule show dev residwg table 48574
root@RUTX10:~#
It houldn’t be necessary to perform a factory reset.
Are you sure about the keys / peer IDs ?
Can you execute a tcpdump in CLI before starting the tunnel via the UI: tcpdump -i eth1 -n -v 'port 48574'
What do you see ?
If I use the keys from the config file from the provider (that I copy paste into the web UI) straight from my computer they work fine and I get a tunnel which I can also confirm through the provider’s test web page. Before we added the code and (especially) turning on ‘route allowed IPs’ I would also get a handshake from them in the router although traffic would not flow through the tunnel.
I did one via the built in windows ssh server and one via the cli after starting the tunnel. Same result:
(Ah. Got my hopes up there. Will be away for two weeks or so and since my Teltonika is not a mobile model it will not join me. Will get back in the saddle when I return - can start a new thread with whatever ideas or advice you may come up with in the meantime. Thank you for your efforts so far! /T)