
Change IPv4 Upstream gateway to our newly created "se1_gw - 10.64.0.1". Click on the button Display Advanced settings. Click on 💾 Save and then click on ✔ Apply Changes.Īdd the VPN gateway to the WireGuard tunnel. IPv4 Address: Enter the IP you got from the Mullvad API earlier. IPv4 Configuration Type: Select "Static IPv4". Available network ports: select "tun_wg0". Public Key: "Qn1QaXYTJJSmJSMw18CGdnFiVM0/Gj/15OdkxbXCSG0=". Dynamic Endpoint": Uncheck this so that you're able to manually enter an IP and port. In the WireGuard → Tunnels overview, click on the pencil button under "Actions" to edit the tunnel. You can find the IP-addresses and Public Keys for the servers in our Servers list. Now we will add the WireGuard server (known as a "Peer" in the web GUI). Interface Addresses: Enter the IP you got when running the curl command earlier. Interface Keys: Enter your private key that you generated earlier ( cat /usr/local/etc/wireguard/privkey). Description: Enter a name for the tunnel. The IP-address to use when configuring your WireGuard interface will be returned and saved in the "mullvad-ip" file. Run curl -d account=YOURMULLVADACCOUNTNUMBER -data-urlencode pubkey=YOURPUBLICKEY | tee mullvad-ip Replace YOURMULLVADACCOUNTNUMBER with your Mullvad account number without any spaces, and replace YOURPUBLICKEY with the pubkey above. Run echo "public wireguard key" cat pubkey echo echo "private wireguard key" cat privkey.
Run wg genkey | tee privkey | wg pubkey > pubkey.
Generate WireGuard keys and get your IP from our API
Search for "wireguard", then click on the green + Install button and then the ✔ Confirm button. Go to System → Package Manager → Available Packages.
WireGuard is available as an experimental add-on package. You will need to change this to match the server you wish to use.įor using OpenVPN instead of WireGuard see the guide Using pfSense with Mullvad. We will connect to one of our Swedish servers (se1-wireguard). This guide will help you set up WireGuard on pfSense 2.6.0 with our servers.