


The WireGuard servers run an unfiltered DNS on the internal IP 10.64.0.1. Click on the pencil button next to the rule with the description "Default allow LAN to any".We also need to change the firewall rules so that our clients are allowed to reach the WireGuard gateway.


You can find the IP-addresses and Public Keys for the servers in our Servers list. Now we will add the WireGuard server (known as a "Peer" in the web GUI). Interface Addresses: Enter the IP you got when running the curl command earlier.Interface Keys: Enter your private key that you generated earlier ( cat /usr/local/etc/wireguard/privkey).Description: Enter a name for the tunnel.The IP-address to use when configuring your WireGuard interface will be returned and saved in the "mullvad-ip" file.Run curl -d account=YOURMULLVADACCOUNTNUMBER -data-urlencode pubkey=YOURPUBLICKEY | tee mullvad-ip Replace YOURMULLVADACCOUNTNUMBER with your Mullvad account number without any spaces, and replace YOURPUBLICKEY with the pubkey above.Run echo "public wireguard key" cat pubkey echo echo "private wireguard key" cat privkey.Run wg genkey | tee privkey | wg pubkey > pubkey.Generate WireGuard keys and get your IP from our API Search for "wireguard", then click on the green + Install button and then the ✔ Confirm button.Go to System → Package Manager → Available Packages.WireGuard is available as an experimental add-on package. You will need to change this to match the server you wish to use.įor using OpenVPN instead of WireGuard see the guide Using pfSense with Mullvad. We will connect to one of our Swedish servers (se1-wireguard). This guide will help you set up WireGuard on pfSense 2.6.0-RELEASE with our servers.
