Replies: 6 comments 5 replies
-
Hello @xgusto I just made a few tests using the qrcode generated on wireguard_webadmin. Please make sure that you are adding the allowed ips to "Client routing configuration". As soon as you add any route, it will remove the default route. Please make sure that you are using at least version 0.9601 Today I will also remove the requirement for primary dns server as you requested ;) |
Beta Was this translation helpful? Give feedback.
-
Excellent work. It works exactly as you wrote. |
Beta Was this translation helpful? Give feedback.
-
Would it be possible to apply AllowedIPs lists to groups of peers? Perhaps through policies that could be applied to peer groups. Have you considered implementing such functionality? |
Beta Was this translation helpful? Give feedback.
-
Yes, that's exactly what I mean. Right now, when you add many users and don't use the default route, you have to manually add the necessary routes for each peer, which is quite time-consuming. It would be great to have some kind of presets or route lists. Thanks! |
Beta Was this translation helpful? Give feedback.
-
Just to clarify — am I right in assuming the short name is mainly intended for the left-hand navigation menu? If so, then it makes sense to keep it as short and intuitive as possible. From your suggestions, Routing profiles and Custom routes are clear, though maybe a bit long for a menu label. |
Beta Was this translation helpful? Give feedback.
-
Just wanted to share an idea that might extend the current routing templates discussion: Since there's already a "Firewall" tab in the interface – have you considered adding a more visual way to manage both firewall and routing rules? For example, a drag-and-drop UI to create client- or group-based rules. This could make it easier for beginners to define safe, limited access (e.g. LAN-only routing), while also helping advanced users manage bulk rule assignments more efficiently. A visual interface could simplify tasks like: “deny internet access for a whole group of users” or “allow only specific networks for a set of peers”, without having to manually repeat the same logic. Manual rule editing would still be important for advanced use cases, but this could streamline common setups for many users. If this idea doesn’t fit well here, feel free to let me know and I can open a separate issue. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
When I used only wireguard (without wg-webadmin), I configured the clients as follows:
QR code generation
qrencode -t ansiutf8 < client01.conf
I use the wireguard app on my mobile phone (android). If I scanned the QR code in the app, the allowed IPs were also filled in automatically.
When I set the allowed IPs in WG-Webadmin and scan the QR code on my mobile phone, I still see the allowed IPs 0.0.0.0/0, ::/0 on my mobile phone. Then I have to fill in the IP addresses manually. I need the client not to access the Internet through wireguard, but to be terminated in LAN networks (192.168.20.0/24,10.0.3.0/24).
Here is an illustrative picture of what I have to fill in manually in app
Beta Was this translation helpful? Give feedback.
All reactions