Hi everyone,
I’m running a permanent, fixed WireGuard setup between two GL.iNet Flint 2 routers located in two different U.S. states, and I’d like to validate that my configuration follows best practices. The goal is simply for all devices behind the Travel Flint 2 to route their outbound traffic through the Home Flint 2’s WAN connection.
One of the devices behind the Travel router uses Citrix Workspace for remote access, so I want to ensure the routing setup is correct for stable outbound connectivity.
Here is a full outline of my configuration.
1. Hardware Locations
**• Home Flint 2 (WireGuard Server)**
• Permanently installed at my residence
• Will not be moved or changed
**• Travel Flint 2 (WireGuard Client)**
• Permanently installed at a second fixed location in another U.S. state
• Not mobile, not roaming, not being relocated
This is a stable two-site, point-to-point design.
⸻
2. Home Flint 2 – WireGuard Server Configuration
**• WireGuard Server enabled**
**• Listen port: UDP 51820**
**• WG IPs assigned (e.g., server** 10.0.0.1**, client** 10.0.0.2**)**
**• UDP 51820 forwarded from ISP router → Home Flint 2**
**• GL.iNet DDNS enabled (so the Travel router can always find the server)**
**• Default DNS is sufficient**
⸻
3. Travel Flint 2 – WireGuard Client Configuration
**• Imported WG client config generated by the Home router**
**• AllowedIPs = 0.0.0.0/0 (full tunnel)**
**• Global Proxy enabled**
**• Kill Switch (Block Non-VPN Traffic) enabled**
**• PersistentKeepAlive = 25**
**• MTU \~1420 (adjustable depending on ISP/hotels)**
**• Running behind a standard ISP router (double NAT, acceptable for outbound-only use)**
⸻
4. Traffic Flow Diagram (Full-Tunnel Path)
(1) Local Device (IGEL OS / Laptop)
│
│ Normal LAN traffic (DHCP, IPv4, no VPN on device)
▼
(2) Travel Flint 2 — WireGuard Client
│
│ Applies Global Proxy + Kill Switch
│ Encapsulates all packets inside WireGuard
▼
(3) Encrypted WireGuard Tunnel (UDP 51820)
│
│ Uses server public key + DDNS hostname
▼
(4) HOME Flint 2 — WireGuard Server
│
│ Decrypts packets and routes them out via the home ISP
▼
(5) Internet (HOME public IP)
│
│ All traffic now appears as coming from HOME
▼
(6) Destination Services (Citrix / Work VDI / Web / Apps)
This is the exact behavior I want to validate.
⸻
5. Expected Behavior
**• Devices behind Travel Flint 2 get LAN IPs (192.168.x.x)**
**• All traffic encrypted → sent to Home Flint 2 → exits via Home WAN IP**
**• DNS queries also routed through the tunnel**
**• No inbound connections needed at Travel site**
**• Citrix Workspace and other applications should simply use the Home WAN for all outbound sessions**
⸻
6. Optional Enhancements Enabled
**• Custom DNS (1.1.1.1) on Travel router**
**• SQM / Cake QoS on Home router**
**• Reserved WG IP for cleaner management**
⸻
7. My Questions for Validation
1\. Does this Flint-to-Flint full-tunnel WireGuard configuration follow GL.iNet best practices?
2\. Since the routers are permanently installed in two U.S. states, is anything recommended for long-term stability?
3\. Is double NAT acceptable for an outbound-only WireGuard client setup?
4\. Any recommended performance optimizations for WireGuard on Flint 2 hardware?
5\. Does the traffic flow diagram above look correct for devices that rely on stable outbound connectivity (e.g., Citrix Workspace)?
Thank you to anyone who can confirm or suggest improvements!
