Hello,
I am trying to set a GL-SFT1200 as a dedicated secondary VPN router behind a primary Netgear CAX30 (cable modem/router combo). I am setting a Wireguard client on the secondary router to access a Windscribe VPN service.
I have been trying for over two weeks and went through many tutorials and done a lot of research, I also checked similar posts in that forum which helped me a lot with the configuration that I’m sharing below, but I still can’t get it to work.
I’m kind of a beginner in networks, so some of the options that are listed below might be wrong or not needed, so please let me know.
The WAN port of the primary modem/router is connected to the internet source from the ISP, and I have an ethernet connection from a LAN port in the primary router to the WAN port of the secondary router.
Here are the main settings in the primary modem/router:
It has the default Netgear firmware version V1.4.12.2
LAN IP Address: 192.168.1.1
IP Subnet Mask: 255.255.255.0
Use Router as DHCP Server: checked
Secondary router has static IP address reservation “192.168.1.20”
Default DMZ Server: checked, and set to the secondary router WAN IP “192.168.1.20”
Port Forwarding:
External Port Internal Port Internal IP Address
UDP: 51820 UDP: 51820 192.168.1.20 (For Wireguard)
TCP: 1723 TCP: 1723 192.168.1.20 (For VPN-PPTP Passthrough)
Here are the settings in the secondary router:
Firmware Version: OpenWrt 18.06 r0-d5ed025 / LuCI openwrt-18.06 branch (git-18.228.31946-f64b152)
Kernel Version: 4.14.90
Interfaces:
WG0
-
Status:
Device: WG0
Uptime: 5h 16m 17s
RX: 81.56 KB (1147 Pkts.)
TX: 48.73 KB (772 Pkts.)
IPv4: xxx.xxx.xxx.xxx/32 (from VPN config) -
Protocol: WireGuard VPN
-
Private Key: From VPN config
-
Listen Port: 51820
-
IP Addresses: xxx.xxx.xxx.xxx/32 (from VPN config)
-
Bring up on boot: Checked
-
Use builtin IPv6-management: Checked
-
Force link: Checked
-
Metric: 0 (Default)
-
MTU: 1420 (Default)
-
Firewall Mark: empty (Default)
Peers
-
Public Key: From VPN config
-
Preshared Key: From VPN config
-
Allowed IPs:
0.0.0.0/0
::/0 -
Route Allowed IPs: Checked
-
Endpoint Host: From VPN config
-
Endpoint Port: 443
-
Persistent Keep Alive: 25
WAN
-
Status:
Device: eth0.2
Uptime: 5h 26m 20s
RX: 20.05 MB (155384 Pkts.)
TX: 2.00 MB (20227 Pkts.)
IPv4: 192.168.1.20/24 -
Protocol: DHCP client
-
Hostname to send when requesting DHCP: GL-SFT1200-b0d
-
Bring up on boot: Checked
-
Use builtin IPv6-management: Checked
-
Force link: Un-checked
-
Use broadcast flag: Un-checked
-
Use default gateway: Checked
-
Use DNS servers advertised by peer: Un-checked
-
Use custom DNS servers: From VPN config
-
Use gateway metric: 10 (Default)
-
Client ID to send when requesting DHCP: empty (Default)
-
Vendor Class to send when requesting DHCP: empty (Default)
-
Override MAC address: (Default)
-
Override MTU: 1500 (Default)
-
Bridge interfaces: Un-checked
-
Interface: eth0.2
LAN
-
Status:
Device: br-lan
Uptime: 3h 52m 56s
RX: 9.30 MB (85102 Pkts.)
TX: 7.73 MB (83903 Pkts.)
IPv4: 192.168.8.1/24 -
Protocol: Static address
-
IPv4 address: 192.168.8.1
-
IPv4 netmask: 255.255.255.0
-
IPv4 gateway: 192.168.1.20
-
IPv4 broadcast: empty (Default)
-
Use custom DNS servers: empty (Default)
-
IPv6 assignment length: 60 (Default)
-
IPv6 assignment hint: empty (Default)
-
IPv6 suffix: ::1 (Default)
-
Bring up on boot: Checked
-
Use builtin IPv6-management: Checked
-
Force link: Checked
-
Override MAC address: (Default)
-
Override MTU: 1500 (Default)
-
Use gateway metric: 0
-
Bridge interfaces: Checked
-
Enable STP: Un-checked
-
Enable IGMP snooping: Un-checked
-
Interface: eth0.1, wlan0, wlan1
DHCP Server
-
Ignore interface: Un-checked
-
Start: 100 (Default)
-
Limit: 150 (Default)
-
Lease time: 12h (Default)
-
Dynamic DHCP: Checked
-
Force: Checked
-
IPv4-Netmask: empty (Default)
-
DHCP-Options: empty (Default)
Firewall - Zone Settings
-
Enable SYN-flood protection: Checked
-
Drop invalid packets: Un-checked
Zones
Name Zone => Forwardings Input Output Forward Masquerading MSS Clamping
lan lan => WGZone accept accept accept Un-checked Un-checked
wan wan => REJECT reject accept reject Checked Checked
WGZone WGZone => REJECT reject accept reject Checked Checked
I am connecting a laptop to the a LAN port of the secondary router. Before adding the VPN Interface, I was able to access the internet through the laptop. However, when I created the VPN Interface and set the zones as above, I don’t have internet access any more. Also the wifi on my phone can see the network, but it says “No internet access”.
I tried the Windscribe config file on different machines connected directly to the primary modem/router, and it’s working fine, so that rules out any issues with the config file and the VPN server.
I tried logging to the primary modem/router portal from the laptop that is connected to the secondary router, but it didn’t work (and I don’t mind, just sharing in case that helps in the debugging)
I used the diagnostic tool on the secondary router, and it’s connected to the internet through the VPN, and I was able to even download some packages to the router through the router’s Software tab. I confirmed that the router is connected to the internet by using ping, traceroute, nslookup, and the following command which showed my IP address as the one in the VPN config.
. /lib/functions/network.sh; network_find_wan NET_IF; network
_get_ipaddr NET_ADDR "${NET_IF}"; echo "${NET_ADDR}"
Here’s the output from the traceroute command on the secondary router:
traceroute to openwrt.org (139.59.209.225), 30 hops max, 38 byte packets
1 192.168.1.1 1.959 ms
2 *
3 96.34.113.96 9.920 ms
4 96.34.112.39 11.167 ms
5 96.34.2.34 14.421 ms
6 96.34.3.71 12.701 ms
7 62.115.180.82 12.947 ms
8 *
9 *
10 62.115.137.54 30.266 ms
11 *
12 62.115.141.245 55.898 ms
13 *
14 62.115.112.63 122.339 ms
15 62.115.44.250 123.304 ms
16 138.197.244.67 135.773 ms
17 *
18 *
19 *
20 *
21 139.59.209.225 134.297 ms
I tried ping and nslookup on the laptop connected to the secondary router, and both of them failed, and the traceroute command gave me the following output:
traceroute to openwrt.org (139.59.209.225), 64 hops max, 52 byte packets
1 console.gl-inet.com (192.168.8.1) 1.885 ms 1.248 ms 0.939 ms
2 console.gl-inet.com (192.168.8.1) 0.917 ms 0.941 ms 0.937 ms
I downloaded Wireshark to trace the packets, tried to navigate to a website through my browser, and here’s what I got in Wireshark:
I made sure to reboot both routers after every change I made, and also I go to the System and sync the clock to the browser to avoid the race condition.
I have a feeling that it’s a NAT issue that can be solved with a firewall rule, but I don’t know how to do it or what to try next.
Please let me know if any more information is needed.