Knowledge Base Setting Up WireGuard with TP Link Omada
Note: Added update 10/11/23
Hello all, one of my YT viewer advised me that there's still no guide about WireGuard with Omada so I am posting one here. I also made a step-by-step guide video, you can find the configuration starting at Part 4 (the video has more info as it also covers ACL and InterVLAN). Find more info about WireGuard at wireguard dot com. Download their client at wireguard dot com /install/
Please refer to your hardware's release notes if your system is supported.
Hardware tested :
- ER-7206 v2 with v1.3.x (or higher) firmware
- OC-300 with v5.9.x firmware
Update 10/11/23:
Supported Hardware
- ER-605 v1 does not support Wireguard. May never get this added since OG ER-605 is EOL :(
- ER-605 v2, ER-7206, ER-8411 - I personally have tested and works
- Other Gateways, please refer to their latest firmware for Wireguard support (high chance it is supported)
TP Link's VPN Clent (Includes Wireguard, OpenVPN, etc in one Client)
* There is a VPN Client for Windows released by TP Link which is much simpler to use.
End of Update 10/11/23
Note:
WireGuard supports many hardware and Operating Systems. But for this guide, I am only going to use Windows 10 Operating System for Client with ER-7206 as Server/interface.
Pre-requisites:
- WAN IP or FQDN pointing to WAN IP
- WireGuard Client installed
High Level Steps:
- WireGuard Interface (server) Set Up (Omada)
- WireGuard Client Set Up (Windows)
- WireGuard Peers (client) Set Up (Omada)
WireGuard Interface (server) Set Up (Omada)
- Settings > VPN > WireGuard
- Click "+Create New WireGuard"
- Enter "Name:" i.e. wg0
- Use your an unused LAN IP to fill up "Local IP Address"
- Click "Apply"
- Copy the "Public Key", save it to text editor
WireGuard Client Set Up (Windows)
- Launch your WireGuard client
- Click "Empty Tunnel"
- Give it a name i.e. OmadaWGS
- Copy the "Public key" string that is just under the "Name" of the tunnel, save it to text editor
- Under [Interface]
- "PrivateKey" = Do not modify
- "Address" = Add unused PrivateIP in CIDR format i.e. 10.1.1.1/24
- "DNS" = Add well known public i.e. 1.1.1.1 or 8.8.8.8
- Under [Peer]
- "Public Key" - Enter the value copied in "Step 6" of the WireGuard Interface Set Up
- "AllowedIPs" = use 0.0.0.0/0, ::/0
- "Endpoint" = Use FQDN and/or WAN IP with :51820 port i.e. 172.20.110.102:51820
- Save
WireGuard Peers (client) Set Up (Onada)
- Settings > VPN > WireGuard > Peers
- Give it a "Name" i.e. RemotePC
- Select the "Interface" from the drop down
- In "Allow Address" field, enter the same IP you entered in "Step 5.2" of the WireGuard Client Set Up with /32 (single IP) or /24 (subnet IP)
- In "Public Key", enter the value copied in "Step 4" of the WireGuard Client Set Up
- Click "Apply"
Testing:
- Click "Activate" on the WireGuard Client.
- In Omada, go to Insights > VPN Status > WireGuard VPN
For reference, below is how I have my lab set up in my video guide.
Happy hunting!