However, the communication does not go through the default gateway (192.168.32.2) but through eth0 (192.168.1.1).
root@GL-MT3000:~# traceroute www.google.com
traceroute to www.google.com (142.250.206.196), 30 hops max, 46 byte packets
1 192.168.1.1 (192.168.1.1) 0.680 ms 0.693 ms 0.775 ms
2 210.227.xx.xx (210.227.xx.xx) 1.036 ms 1.125 ms 1.054 ms
3 211.0.223.41 (211.0.223.41) 2.451 ms 2.329 ms 2.236 ms
4 153.146.171.209 (153.146.171.209) 2.056 ms 2.020 ms 1.954 ms
5 60.37.54.69 (60.37.54.69) 2.454 ms 122.1.245.49 (122.1.245.49) 2.752 ms 60.37.54.69 (60.37.54.69) 2.255 ms
6 122.28.104.122 (122.28.104.122) 4.853 ms 2.430 ms 60.37.54.110 (60.37.54.110) 2.378 ms
7 61.126.86.26 (61.126.86.26) 2.842 ms 61.126.86.30 (61.126.86.30) 2.506 ms 61.126.86.26 (61.126.86.26) 2.991 ms
8 * * 108.170.242.176 (108.170.242.176) 4.704 ms
9 216.239.41.68 (216.239.41.68) 2.922 ms 108.170.237.92 (108.170.237.92) 2.676 ms 209.85.244.35 (209.85.244.35) 4.002 ms
10 142.250.58.92 (142.250.58.92) 10.439 ms 108.170.242.209 (108.170.242.209) 3.705 ms 108.170.242.208 (108.170.242.208) 5.594 ms
11 209.85.241.107 (209.85.241.107) 3.898 ms 209.85.244.2 (209.85.244.2) 4.002 ms 209.85.244.37 (209.85.244.37) 3.615 ms
12 142.250.58.20 (142.250.58.20) 20.736 ms 142.250.229.250 (142.250.229.250) 9.953 ms 142.250.58.20 (142.250.58.20) 11.479 ms
13 108.170.243.97 (108.170.243.97) 10.923 ms 11.406 ms 108.170.243.129 (108.170.243.129) 9.881 ms
14 142.250.236.53 (142.250.236.53) 10.199 ms kix07s07-in-f4.1e100.net (142.250.206.196) 9.796 ms 142.250.236.35 (142.250.236.35) 9.756 ms
root@GL-MT3000:~#
I have tried similar VPN and network settings on an OpenWRT router from another manufacturer and it works fine, do I need any Beryl specific settings?
WireGuard is not always faster, particularly when AES runs 5x faster than ChaCha.
It’s a disaster to configure and maintain if you’ve got more than about 10-15 nodes.
You may already have an IPSec stack set up and you want to plug into that.
You’re connecting to an enterprise network that may only allow IPSec and not WireGuard.
I will grant that IPSec can be a pain to configure**, but it’s just not true that WireGuard is universally a better solution. WireGuard is very good for a very specific set of use cases, but if you need or want to do anything more complicated it can fall apart quickly. There are other reasons to avoid using it in production applications (e.g., no support for cipher negotiation***), but we’ll leave that aside for now.
** (or it can be quite easy! I would take the bet that I could set up a point-to-point IPSec tunnel between two pfSense nodes as fast or faster than you can set up a WireGuard tunnel between two MT3000s - particularly if anything complicated needed to happen.)
*** What happens if there’s a serious break in ChaCha20 that’s published tomorrow? You have to push a kernel update to all of your devices because WireGuard is “opinionated” (to use the white paper’s term) about its cipher suite. Not so big of a deal if you have 2 travel routers that you can update at your leisure. Major deal if you’re using it in an industrial control system where you can’t reboot without taking the plant down for maintenance. Or you need to update 1,000 endpoints basically simultaneously. Oops. With the capacity to automatically switch between ciphers, you uncheck a box (or delete a string from the config file) and everything just works.
Thank you!
I disabled mwan3 and everything worked fine.
root@GL-MT3000:~# traceroute www.google.com
traceroute to www.google.com (216.58.220.100), 30 hops max, 46 byte packets
1 192.168.32.2 (192.168.32.2) 5.472 ms 5.352 ms 5.655 ms
2 xxxxxx.kddnet.ad.jp (118.155.xxx.xxx) 12.179 ms 10.581 ms 9.826 ms
3 72.14.242.145 (72.14.242.145) 14.301 ms 14.988 ms 14.808 ms
4 * * *
5 64.233.175.42 (64.233.175.42) 15.354 ms 108.170.235.120 (108.170.235.120) 10.853 ms 108.170.236.126 (108.170.236.126) 10.105 ms
6 108.170.242.209 (108.170.242.209) 11.013 ms 142.250.226.59 (142.250.226.59) 13.016 ms 108.170.242.208 (108.170.242.208) 9.682 ms
7 nrt12s30-in-f4.1e100.net (216.58.220.100) 13.830 ms 72.14.234.67 (72.14.234.67) 14.345 ms nrt12s30-in-f4.1e100.net (216.58.220.100) 13.735 ms
root@GL-MT3000:~#