Here are instructions on how to set up a Remote Access VPN using the Built-In Wireguard capabilities of VergeOS. More information can be found in the Help section of the VergeOS User Interface.
You can use an existing Internal Network or create a new Internal Network.
In the Verge OS UI, Navigate to Networks->Internals and View or double-click on the Internal Network that you want to use.
In the left menu, Click on Wireguard (VPN)
Click on Add New Interface
Enter the Information below:
Click Submit to add the new interface
After adding the interface, it will take you to the dashboard where you will see your new interface.
Click Apply Rules on the left menu bar to apply the firewall rules. Here are the rules that it adds:
In order for the internal network to be connected, we need an external PAT (Port Address Translation) rule to translate the port (default 51820) to the internal network.
Add External PAT Rule
Source:
8. In the Type dropdown, select Any/None. Optionally you can source-lock the VPN traffic here if you have that requirement.
Destination:
9. In the Type dropdown, select My Router IP. If you are inside of a Tenant, change this to My IP Addresses and choose the IP of the Tenant UI. This should be the same as the Endpoint IP used above. If you plan to use a different IP than the UI IP, we recommend that you to create a SNAT rule on the External network. See below for instructions.
10. In the Destination Ports/Ranges field, enter the Port (Default Port is 51820)
Target:
11. In the Type dropdown, select Other Network DMZ IP.
12. In the Target Network dropdown, select the Target Network.
13. In the Target Ports/Ranges field, leave this blank.
14. Click Submit.
15. Click Apply Rules on the left menu to put the new rule into effect.
If you are adding Wireguard and you are not using the IP address of the UI, we recommend creating an SNAT rule on the External network.
Source:
8. In the Type dropdown, select Other Network DMZ IP.
9. In the Network dropdown, select the Internal Network that Wireguard is on.
10. In the Source Ports/Ranges field, leave this blank.
Destination:
11. In the Type dropdown, select Any / None.
12. In the Destination Ports/Ranges field, leave this blank.
Target:
13. In the Type dropdown, select My IP Addresses.
14. In the IP Address dropdown, select the IP address you want to use.
15. In the Target Ports/Ranges field, leave this blank.
16. Click Submit.
17. Click Apply Rules on the left menu to put the new rule into effect.
This SNAT rule is recommended to force any outgoing traffic coming from the DMZ IP of the internal network to use the correct IP instead. By default it will go out the IP of the UI and this can cause some flapping issues.
You will set up a Peer for each User connecting to the VPN
From the Wireguard Interface screen, Click Add new peer.
Assign a Name to the peer, such as the remote user's name.
Optionally, a Description can be entered to store additional information about this peer.
Check the Auto-Generate Peer Configuration checkbox to automate settings and create a configuration file that can be used on the client.
Enter the Endpoint for the Peer (the external-facing IP address, hostname, or URL this system will use to communicate with the peer). This can be left blank if the internal network will never be initiating traffic across the VPN (i.e. roaming client).
For Allowed IPs, Enter the /32 IP for this peer.
In the Configure Firewall dropdown, select Remote User
Click Submit to save the new peer entry.
WireGuard Client software can be downloaded from: https://wireguard.com/install . (In this example, we download and install WireGuard for Windows-64bit to use on a Windows 10 Pro machine.)
Need more Help? Email support@verge.io or call us at (855) 855-8300