HELP: Wireguard for home network with remote exit node
from portnull@lemmy.dbzer0.com to selfhosted@lemmy.world on 09 Aug 10:30
https://lemmy.dbzer0.com/post/50760506
from portnull@lemmy.dbzer0.com to selfhosted@lemmy.world on 09 Aug 10:30
https://lemmy.dbzer0.com/post/50760506
I am looking for some advice on how to (if possible) setup a wireguard network for my home network and when I am connected to that network have a remote wireguard server act as an exit node, so that all external traffic appears to be coming from that remote server whilst keeping traffic bound for the home network local (only accessible via wireguard network)
Local server is a Debian box and other devices will run a flavour of linux. Remote server is already running wireguard and I can connect to that if I bring up a route on each device, but ideally I want to connect to my home net and automatically have outbound traffic go via the remote server. The remote server’s wireguard config is not under my control, which may make this unfeasible
threaded - newest
VPN cascading is the term you’re looking for. Yes, it’s possible with wireguard. Who controls the exit server is not of any concern, although you might break the ToS of the commercial VPN provider in question - but they can’t really see that.
Thanks, knowing the term will help search for information
It’s not really clear exactly what you want.
When you’re at home, and for services running on your home server, it you want everything to go through the remote wireguard server then that’s achievable.
However, if you want to be able to access services running on your home server, while you’re not at home, via that remote wireguard server, that generally requires port forwarding which commercial providers generally don’t offer.
Can you clarify ?
Sorry to be unclear Yes I want to be able to access my home services from outside over wireguard, but connect directly into the home network. However once connected to the home network I want all traffic to be routed outside via the remote wireguard server.
I want to make sure I understand your goal correctly. Here’s what I’m getting.
Here’s the part where I’m a little fuzzy
Did I get any part of that wrong?
Edit: NVM. I saw your response to another comment that sounds like this is exactly what you want.
This should be achievable via routing. I actually do the same thing. The main difference is all the work is done on my router which handles both wire guard connections and routing.
At the minimim you’re going to need:
Thank you for the detailed explanation. I will give this a shot.
You can set this up with your router connecting to the remote server and routing your client traffic through there instead of the gateway your router is using for WAN.
Specifics are router... Specific.
You can do the same with a vm in your network acting as a router or proxy as well, pick your poison.
If I’m understanding what you want to do, I have this set up on an OpenWRT router with multiple remote endpoints used for different devices. Our phones go to a hosted Wireguard server in one city, PCs to an OpenWRT router in a different location, and IOT devices that aren’t blocked and guest devices exit access the Internet locally. With some additional work you should also be able to have remote devices connected via WG exit wherever you like.
Policy Based Routing on OpenWRT makes this possible and it should be doable as long as the devices you want to allow to exit the remote server are included in that server’s “Allowed IPs” setting. (Maybe there’s a way around that, but I haven’t had to deal with it.)
You could maybe do this with tailscale: all your devices will be reachable from each other, and you can specify that you want the external one to be the exit node. It uses wireguard under the hood.
The issue is that the remote server (the one I want to use as the exit node) doesn’t have tailscale on it. Otherwise I’d be doing just that :D
Thank you for everyone’s help and input. I have it working now, albeit not in the way I had hoped (not using docker containers for it) but it works. I followed …substack.com/…/setting-up-a-tailscale-exit-node but instead of using the NordVPN image I used the plain Wireguard client image. In the wireguard compose I set
network_mode: container:wireguard
. Now when I connect tailscale over the exit node, traffic is going out over the wireguard IP