Can't access containers remotely
https://lemm.ee/post/49067507
=> More informations about this toot | More toots from WeAreAllOne@lemm.ee
Can you ping the server through your tunnel? Maybe try a traceroute to see if it gets through your router correctly.
If this does work, check if the arrs have some “restrict to local network” setting.
If not, I’d check the firewall logs on your router to see if it is blocking the connection.
=> More informations about this toot | More toots from exu@feditown.com
Wireguard only gets you to the endpoint. You need extra routes from there.
Post your wg config, and possibly the staticnroute table on the router.
=> More informations about this toot | More toots from just_another_person@lemmy.world
To add, here’s an example of my config addition to ensure 192.168.1.* is accessible over VPN
push "route 192.168.1.0 255.255.255.0 vpn_gateway"
=> More informations about this toot | More toots from colonelp4nic@lemmy.world
OpenVPN does routing a tad differently, but same point applies. Network clients need to know where to go to find a route that isn’t part of the home subnet they are joined too. With containers in the mix without bridging, the host needs to know that the WG subnet can be found at the router.
=> More informations about this toot | More toots from just_another_person@lemmy.world
Ah makes sense. I’m using a Mikrotik router and implemented the Back to Home function which automatically creates the tunnel and all firewall configs. Supposedly it’s like me being in my home network but I need to look into your suggestions.
=> More informations about this toot | More toots from WeAreAllOne@lemm.ee
That may look fine from your router’s perspective, but if your network clients don’t get an updated routing tables, they won’t know or possibly accept traffic from the new subnet on the VPN.
=> More informations about this toot | More toots from just_another_person@lemmy.world
Solved. All I needed to do was route the Back to Home (wire guard ) address list to a table for the server. 🤙
=> More informations about this toot | More toots from WeAreAllOne@lemm.ee
You can set up one device to do masquerading and forwarding then you can see entire lan
=> More informations about this toot | More toots from BCsven@lemmy.ca
I’m not familiar with wireguard but I use Tailscale and it works really well
=> More informations about this toot | More toots from Hiro8811@lemmy.world This content has been proxied by September (ba2dc).Proxy Information
text/gemini