Chewie420
Regular Contributor
Code:
E:Option ==> diag
WireGuard VPN Peer Status
interface: wg21
public key: FSRDl
private key: (hidden)
listening port: 51820
peer: TB3Cv
preshared key: (hidden)
allowed ips: 10.50.1.2/32
interface: wg11
public key: SM
private key: (hidden)
listening port: 51820
peer: RR93
endpoint: 192..xxx.xxx.xxx:1443
allowed ips: 0.0.0.0/0
persistent keepalive: every 25 seconds
WireGuard VPN Peers
Peers (Auto=P - Policy, Auto=X - External i.e. Cell/Mobile)
Server Auto Subnet Port Annotate
wg21 Y 10.50.1.1/24 51820 # RT-AX88U Server #1
Client Auto IP Endpoint DNS MTU Annotate
wg11 N 10.13.53.185/24 192.xxx.xxx.xxx:1443 1.1.1.1 # TorGuard WireGuard Config
Device Auto IP DNS Allowed IPs Annotate
Chewie_iPhone12Pro X 10.50.1.2/32 64.71.255.204 0.0.0.0/0 # Chewie_iPhone12Pro "Device"
DEBUG: Routing info MTU etc.
33: wg21: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.50.1.1/24 scope global wg21
valid_lft forever preferred_lft forever
34: wg11: <POINTOPOINT,NOARP> mtu 1420 qdisc noop state DOWN group default qlen 1000
link/none
inet 10.13.53.185/24 scope global wg11
valid_lft forever preferred_lft forever
DEBUG: Routing Table main
10.50.1.0/24 dev wg21 proto kernel scope link src 10.50.1.1
DEBUG: RPDB rules
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
10010: from 192.168.5.103 lookup main
10011: from 192.168.5.109 lookup main
10012: from 192.168.56.0/24 lookup main
10013: from 192.168.50.0/24 lookup main
10014: from 192.168.224.0/24 lookup main
32766: from all lookup main
32767: from all lookup default
DEBUG: Routing Table 121 (wg11) # TorGuard WireGuard Config
192.168.5.0/24 dev br0 proto kernel scope link src 192.168.5.1
DEBUG: Netstat
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.50.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wg21
DEBUG: UDP sockets.
udp 0 0 0.0.0.0:51820 0.0.0.0:* -
udp 0 0 :::51820 :::* -
DEBUG: Firewall rules
DEBUG: -t filter
Chain FORWARD (policy DROP 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 ACCEPT all -- * wg21 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
2 0 0 ACCEPT all -- wg21 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 ACCEPT all -- wg21 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
2 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:51820 /* WireGuard 'server' */
Chain OUTPUT (policy ACCEPT 1086 packets, 190K bytes)
num pkts bytes target prot opt in out source destination
1 0 0 ACCEPT all -- * wg21 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */
DEBUG: -t nat
Chain PREROUTING (policy ACCEPT 110 packets, 22021 bytes)
num pkts bytes target prot opt in out source destination
1 2 123 WGDNS1 udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 /* WireGuard 'client1 DNS' */
2 0 0 WGDNS1 tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 /* WireGuard 'client1 DNS' */
3 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:51820 /* WireGuard 'server' */
Chain POSTROUTING (policy ACCEPT 1 packets, 68 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 MASQUERADE all -- * wg11 192.168.5.0/24 0.0.0.0/0 /* WireGuard 'client' */
Chain WGDNS1 (2 references)
num pkts bytes target prot opt in out source destination
1 1 62 DNAT all -- * * 192.168.5.0/24 0.0.0.0/0 /* WireGuard 'client1 DNS' */ to:1.1.1.1
DEBUG: -t mangle
Chain FORWARD (policy ACCEPT 111 packets, 22351 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 MARK all -- * wg11 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'client' */ MARK xset 0x1/0x7
2 0 0 TCPMSS tcp -- wg11 * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'client' */ TCPMSS clamp to PMTU
3 0 0 TCPMSS tcp -- * wg11 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'client' */ TCPMSS clamp to PMTU
4 0 0 MARK all -- * wg21 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */ MARK xset 0x1/0x7
5 0 0 TCPMSS tcp -- wg21 * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'server' */ TCPMSS clamp to PMTU
6 0 0 TCPMSS tcp -- * wg21 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 /* WireGuard 'server' */ TCPMSS clamp to PMTU
Chain PREROUTING (policy ACCEPT 280 packets, 58013 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 MARK all -- wg11 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'client' */ MARK xset 0x1/0x7
2 0 0 MARK all -- wg21 * 0.0.0.0/0 0.0.0.0/0 /* WireGuard 'server' */ MARK xset 0x1/0x7
Use command 'diag sql [ table_name ]' to see the SQL data (might be many lines!)
Valid SQL Database tables: clients fwmark passthru servers traffic
devices ipset policy session
e.g. diag sql traffic will show the traffic stats SQL table
WireGuard ACTIVE Peer Status: Clients 1, Servers 1
I think I am getting much close now because in the wgm status it does show my VPN IP and not my ISP but when I got to waht is myip.com on PC it still shows ISP IP.