Hello,
I am trying to set up a wireguard tunnel on my beryl-ax to access resources on my home lan including my DNS server
Here is my config
GL-MT3000 running 4.6.4
MT3000 LAN is 192.168.101.0/24
Wireguard subnet on home router is 192.168.100.0/24
Desired DNS server listens on 192.168.100.1
DHCP DNS server settings are left blank so LAN clients query 192.168.101.1:53 by default
however it does not seems like 192.168.101.1 forwards anything to 192.168.100.1
I can manually set 192.168.100.1 as DNS server with nslookup on a LAN client for testing and my home LAN domains resolve just fine so I know the DNS server at 192.168.100.1 is reachable when WG tunnel is active
non local domains resolve fine with 192.168.101.1 so it does seem to be forwarding to upstream WAN DNS
I did some troubleshooting and looks like this port forward rule is not enabled when Wireguard tunnel is activated. If I manually enable to rule then 192.168.101.0 LAN clients will resolve my home LAN hosts using the WG configured DNS
It is customized routing mode. Autodetect does not seem to function properly as it looks like it only reads the first entry in allowed IPs list in wireguard config.
I did not try global mode because as you can see the tunnel is configured as a split tunnel and in global mode it won’t be able to route the rest of traffic through the tunnel. And that also is not the setup I am interested in. I just want my private DNS for ALL DNS resolutions and access to my home LAN subnets.
Workaround would be to have DHCP pass 192.168.100.1 as DNS but then I’ll have to go disable that every time I turn WG VPN off.
I can’t configure MT3000 DNS to 192.168.100.1 manually either because then wireguard won’t be able to resolve peer IP at startup.
As it stands now all needs to be done for this to work is to have the FW enable the port forward rule that was created when tunnel is up. It does seem to disable it properly when tunnel goes down.
Either the startup script is buggy or I’m setting something wrong inadvertently