Hi Michael,

Thanks for clarifying.

> Wireguard can fail back to the Primary route so quickly that it is 
> unnoticeable when you are in a voice call. Very cool!

Yes, very cool, I use that as well.

> So if I did have a secondary IP Address on the wg0 interface, would I need 
> custom firewall rules? 

Keep in mind that the default setting in the WireGuard Config: 

_x_ Create routes for Allowed IP's for all peers

As it says, it will auto-create routes for any AllowedIPs using foreign 
addresses.

I don't think any custom firewall rules will be needed.

I also don't think you need the rc.elocal "Add Secondary IP Addresses to wg0" 
given above.


Lonnie


> On Jun 8, 2019, at 10:28 PM, Michael Knill 
> <michael.kn...@ipcsolutions.com.au> wrote:
> 
> Hi Lonnie
> 
> Sorry for the confusion. No I will have three separate servers, one purely 
> for management and the other two are transit switches, one primary and one 
> backup in case the primary fails.
> The path the VPN takes will be completely up to the Astlinux configuration 
> which may or may not have a failover route configured. Its actually a really 
> neat solution whereby I don't care about any NAT or the path it takes and the 
> testing I have done, Wireguard can fail back to the Primary route so quickly 
> that it is unnoticeable when you are in a voice call. Very cool!
> 
> I have overcome having to reset Wireguard by adding it to the configuration 
> and then adding the peer from the command line as follows:
> wg set wg0 peer <Public key of Endpoint VPN Peer collected above> allowed-ips 
> <Allocated Endpoint IP Address>/32
> 
> Seems to work fine. May be worthwhile adding it to the GUI.
> 
> As far as overlapping routes, the overlap is between individual customer 
> Astlinux peers e.g. you could have a satellite office on 172.29.253.2/24 
> which overlaps with another customer Astlinux peer with the same address. 
> This is not a problem of course unless they know about each other but this is 
> a possibility for a multisite customer.
> It also means that I cant standardise the VPN gateway address at each site 
> for mobile peers e.g. 172.29.253.1 for site 1, 172.29.253.2 for site 2 etc.
> None of this is insurmountable, just maybe not quite a neat as a Local /24 
> subnet for local peers and a separate subnet for the three upstream servers 
> (not three separate subnets as I first mentioned).
> 
> So if I did have a secondary IP Address on the wg0 interface, would I need 
> custom firewall rules? 
> 
> Regards
> Michael Knill
> 
> On 8/6/19, 11:20 pm, "Lonnie Abelbeck" <li...@lonnie.abelbeck.com> wrote:
> 
>    Hi Michael,
> 
>    A single /24 looks simpler to my eye ... very similar to how I do it 
> myself.
> 
>> Hmm it certainly is unusual as there are overlapping routes everywhere but 
>> they just don't know about each other.
> 
>    Overlapping routes ?  I don't see any, all basically point-to-point in 
> your internal WG 172.29.253.0/24 net, so far.
> 
>> It will certainly also get messy if Astlinux boxes peering to us are also 
>> peering to the 3 upstream servers.
> 
>    Can you explain what you mean by "messy" ?
> 
>    ===
>    As an aside, I'm trying to think how the "clients" could be configured as 
> "Mobile Clients" on one of the "servers".  As it is now, adding or removing a 
> "client" requires restarting WireGuard on each of the three servers to apply 
> changes.
> 
>    Michael, correct me if I am wrong, but your current parallel design:
> 
>    client --|-- Primary
>           --|-- Secondary
>           --|-- Management
> 
>    is to allow each 3 paths to go over different transports (PPPoE, Cable, 
> 4G/LTE).
> 
>    But, if you can cleverly use WAN Failover to swap network paths (PPPoE, 
> Cable, 4G/LTE) using this layout:
> 
>    client --|-- Primary --|-- Secondary
>                         --|-- Management
> 
>    In this case only the Primary server needs to know about the clients 
> credentials, and *if* the clients only need a single WG IP address (no client 
> LAN routing over WG) then clients could be auto-assigned "Mobile Client" 
> credentials with IP's in the .101 to .199 range.
> 
>    "Mobile Clients" can be added and removed in realtime without restarting 
> WireGuard.
> 
>    Lonnie
> 
> 
> 
> 
>> On Jun 7, 2019, at 11:40 PM, Michael Knill 
>> <michael.kn...@ipcsolutions.com.au> wrote:
>> 
>> Thanks Lonnie
>> 
>> Yes I'm replying to the original post and yes I do recall now talking about 
>> that. 
>> Hmm maybe I can just use a /24:
>> 
>> -- All 3 upstream servers --
>> gui.wireguard.conf:
>> WIREGUARD_IP="172.29.253.[252|253|254]"
>> WIREGUARD_NM="255.255.255.0"
>> 
>> wg0.peer:
>> [Peer]
>> # Peer 1
>> PublicKey = ###
>> AllowedIPs = 172.29.253.1/32
>> 
>> [Peer]
>> # Peer 2
>> PublicKey = ###
>> AllowedIPs = 172.29.253.2/32  ........>
>> 
>> [Peer]
>> # Peer 100 (Note 101-199 used for Client peer's Remote Peers)
>> PublicKey = ###
>> AllowedIPs = 172.29.253.100/32
>> 
>> -- Client --
>> gui.wireguard.conf:
>> WIREGUARD_IP="172.29.253.[1-100]"
>> WIREGUARD_NM="255.255.255.0"
>> 
>> wg0.peer:
>> [Peer]
>> # Management Server
>> PublicKey = ###
>> Endpoint = management01.ipcaccess.net
>> AllowedIPs = 172.29.253.254/32
>> PersistentKeepalive = 25
>> 
>> [Peer]
>> # Primary Server
>> PublicKey = ###
>> Endpoint = primary01.ipcaccess.net
>> AllowedIPs = 172.29.253.253/32
>> # No keepalive required as SIP Options ping will keep it up
>> 
>> [Peer]
>> # Secondary Server
>> PublicKey = ###
>> Endpoint = secondary01.ipcaccess.net
>> AllowedIPs = 172.29.253.252/32
>> # No keepalive required as SIP Options ping will keep it up
>> 
>> [Peer]
>> # Another Astlinux box peering to us
>> PublicKey = ###
>> AllowedIPs = 172.29.253.2/32,<other accessible routes at the satellite site>
>> # No keepalive required as SIP Options ping will keep it up
>> --
>> 
>> Hmm it certainly is unusual as there are overlapping routes everywhere but 
>> they just don't know about each other. It will certainly also get messy if 
>> Astlinux boxes peering to us are also peering to the 3 upstream servers.
>> So would Secondary addresses actually work if I did it purely for my sanity?
>> 
>> Regards
>> Michael Knill
>> 
>> On 8/6/19, 12:33 pm, "Lonnie Abelbeck" <li...@lonnie.abelbeck.com> wrote:
>> 
>>   Hi Michael,
>> 
>>   I seem to recall discussing this before, but why the 3 separate /24 
>> networks requiring a rc.elocal rather than one /22 network set by the WG 
>> configs ?
>> 
>>   # netcalc 172.29.200.1/22
>>   Address  : 172.29.200.1         10101100.00011101.110010 00.00000001
>>   Netmask  : 255.255.252.0 = 22   11111111.11111111.111111 00.00000000
>>   Wildcard : 0.0.3.255            00000000.00000000.000000 11.11111111
>>   =>
>>   Network  : 172.29.200.0/22      10101100.00011101.110010 00.00000000
>>   HostMin  : 172.29.200.1         10101100.00011101.110010 00.00000001
>>   HostMax  : 172.29.203.254       10101100.00011101.110010 11.11111110
>>   Broadcast: 172.29.203.255       10101100.00011101.110010 11.11111111
>>   Hosts/Net: 1022                  Class B, Private network (RFC1918)
>> 
>> 
>>   Other than that, with only a quick glance, it looks like you understand 
>> the elegance of WireGuard.
>> 
>>   Also I see you noted:
>>   --
>>   # No keepalive required as SIP Options ping will keep it up
>>   --
>>   which is probably just fine, though there is not much added overhead if 
>> "PersistentKeepalive = 25" is also set possibly on the remote non-"SIP 
>> Options ping" peer, just something to file away in your mind.
>> 
>>   Lonnie
>> 
>> 
>> 
>>> On Jun 7, 2019, at 8:57 PM, Michael Knill 
>>> <michael.kn...@ipcsolutions.com.au> wrote:
>>> 
>>> Hi Group
>>> 
>>> I would like to bring this up again as I have begun development of a 
>>> transit switch for my customers (using Astlinux).
>>> The architecture will be both a primary and secondary server for the 
>>> transit switch with regular synchronisation from Primary to Secondary. Both 
>>> will have trunks to my upstream SIP provider with active/active redundancy.
>>> All customer Astlinux boxes will connect via Wireguard VPN as a client to 3 
>>> servers being Primary Transit, Secondary Transit and a Management server (I 
>>> would rather not manage through the Transit servers). The customer Astlinux 
>>> box could also be a VPN server for other satellite sites and user Remote 
>>> Peers.
>>> Should this config work?
>>> 
>>> -- Management Server --
>>> gui.wireguard.conf:
>>> WIREGUARD_IP="172.29.200.254"
>>> WIREGUARD_NM="255.255.255.0"
>>> 
>>> wg0.peer:
>>> [Peer]
>>> # Peer 1
>>> PublicKey = ###
>>> AllowedIPs = 172.29.200.1/32
>>> 
>>> [Peer]
>>> # Peer 2
>>> PublicKey = ###
>>> AllowedIPs = 172.29.200.2/32  ........>
>>> 
>>> [Peer]
>>> # Peer 200
>>> PublicKey = ###
>>> AllowedIPs = 172.29.200.200/32
>>> 
>>> 
>>> -- Primary Server --
>>> gui.wireguard.conf:
>>> WIREGUARD_IP="172.29.201.254"
>>> WIREGUARD_NM="255.255.255.0"
>>> 
>>> wg0.peer:
>>> [Peer]
>>> # Peer 1
>>> PublicKey = ###
>>> AllowedIPs = 172.29.201.1/32
>>> 
>>> [Peer]
>>> # Peer 2
>>> PublicKey = ###
>>> AllowedIPs = 172.29.201.2/32  ........>
>>> 
>>> [Peer]
>>> # Peer 200
>>> PublicKey = ###
>>> AllowedIPs = 172.29.201.200/32
>>> 
>>> 
>>> -- Secondary Server --
>>> gui.wireguard.conf:
>>> WIREGUARD_IP="172.29.202.254"
>>> WIREGUARD_NM="255.255.255.0"
>>> 
>>> wg0.peer:
>>> [Peer]
>>> # Peer 1
>>> PublicKey = ###
>>> AllowedIPs = 172.29.202.1/32
>>> 
>>> [Peer]
>>> # Peer 2
>>> PublicKey = ###
>>> AllowedIPs = 172.29.202.2/32. ........>
>>> 
>>> [Peer]
>>> # Peer 200
>>> PublicKey = ###
>>> AllowedIPs = 172.29.202.200/32
>>> 
>>> 
>>> -- Client --
>>> gui.wireguard.conf:
>>> # This range is used for peers to us that we are a server e.g. satellite 
>>> sites and users
>>> WIREGUARD_IP="172.29.253.1"
>>> WIREGUARD_NM="255.255.255.0"
>>> 
>>> rc.elocal:
>>> # Add Secondary IP Addresses to wg0
>>> ip addr add 172.29.200.1/24 dev wg0
>>> ip addr add 172.29.201.1/24 dev wg0
>>> ip addr add 172.29.202.1/24 dev wg0
>>> 
>>> wg0.peer:
>>> [Peer]
>>> # Management Server
>>> PublicKey = ###
>>> Endpoint = management01.ipcaccess.net
>>> AllowedIPs = 172.29.200.254/32
>>> PersistentKeepalive = 25
>>> 
>>> [Peer]
>>> # Primary Server
>>> PublicKey = ###
>>> Endpoint = primary01.ipcaccess.net
>>> AllowedIPs = 172.29.201.254/32
>>> # No keepalive required as SIP Options ping will keep it up
>>> 
>>> [Peer]
>>> # Secondary Server
>>> PublicKey = ###
>>> Endpoint = secondary01.ipcaccess.net
>>> AllowedIPs = 172.29.202.254/32
>>> # No keepalive required as SIP Options ping will keep it up
>>> 
>>> [Peer]
>>> # Another Astlinux box peering to us
>>> PublicKey = ###
>>> AllowedIPs = 172.29.253.2/32,<other accessible routes at the satellite site>
>>> # No keepalive required as SIP Options ping will keep it up
>>> --
>>> 
>>> Can anyone see problems with this configuration?
>>> 
>>> Regards
>>> Michael Knill
>>> 
>>> From: David Kerr <da...@kerr.net>
>>> Reply-To: AstLinux List <astlinux-users@lists.sourceforge.net>
>>> Date: Tuesday, 1 January 2019 at 6:21 pm
>>> To: AstLinux List <astlinux-users@lists.sourceforge.net>
>>> Subject: Re: [Astlinux-users] Multiple wg interfaces
>>> 
>>> Michael,
>>> A single wg interface can have multiple IP addresses.  They can be 
>>> different subnets too. You will have to manually edit the config files. 
>>> 
>>> David. 
>>> 
>>> On Tue, Jan 1, 2019 at 6:37 AM Michael Knill 
>>> <michael.kn...@ipcsolutions.com.au> wrote:
>>>> Hi group
>>>> 
>>>> Here is my scenario. I have primary and backup Wireguard VPN Peers that 
>>>> multiple Astlinux boxes will be connecting to.
>>>> I assume that I will need different wgx interfaces for this as I cant have 
>>>> the same IP Address.
>>>> If so, just wondering how to set this up in Astlinux?
>>>> 
>>>> Regards
>>>> Michael Knill
>>>> _______________________________________________
>>>> Astlinux-users mailing list
>>>> Astlinux-users@lists.sourceforge.net
>>>> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>>>> 
>>>> Donations to support AstLinux are graciously accepted via PayPal to 
>>>> pay...@krisk.org.
>>> -- 
>>> David Kerr Sent from Gmail Mobile
>>> _______________________________________________
>>> Astlinux-users mailing list
>>> Astlinux-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>>> 
>>> Donations to support AstLinux are graciously accepted via PayPal to 
>>> pay...@krisk.org.
>> 
>> 
>> 
>>   _______________________________________________
>>   Astlinux-users mailing list
>>   Astlinux-users@lists.sourceforge.net
>>   https://lists.sourceforge.net/lists/listinfo/astlinux-users
>> 
>>   Donations to support AstLinux are graciously accepted via PayPal to 
>> pay...@krisk.org.
>> 
>> 
>> 
>> _______________________________________________
>> Astlinux-users mailing list
>> Astlinux-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>> 
>> Donations to support AstLinux are graciously accepted via PayPal to 
>> pay...@krisk.org.
> 
> 
> 
>    _______________________________________________
>    Astlinux-users mailing list
>    Astlinux-users@lists.sourceforge.net
>    https://lists.sourceforge.net/lists/listinfo/astlinux-users
> 
>    Donations to support AstLinux are graciously accepted via PayPal to 
> pay...@krisk.org.
> 
> 
> _______________________________________________
> Astlinux-users mailing list
> Astlinux-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/astlinux-users
> 
> Donations to support AstLinux are graciously accepted via PayPal to 
> pay...@krisk.org.



_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users

Donations to support AstLinux are graciously accepted via PayPal to 
pay...@krisk.org.

Reply via email to