From 99bea3a191de5f3fad41d4c564f72eb0920ac8d0 Mon Sep 17 00:00:00 2001 From: Gitea Actions Date: Mon, 20 Oct 2025 18:53:48 +0000 Subject: [PATCH] Auto-update blog content from Obsidian: 2025-10-20 18:53:48 --- content/post/13-opnsense-full-configuration.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/content/post/13-opnsense-full-configuration.md b/content/post/13-opnsense-full-configuration.md index 9b323ae..20e4f95 100644 --- a/content/post/13-opnsense-full-configuration.md +++ b/content/post/13-opnsense-full-configuration.md @@ -337,7 +337,11 @@ Before clicking `Store and generate next`, from my device, I configure the peer ### Create VPN Interface -This step is not required, but ease the configuration management for firewall rules. On both firewall, in `Interfaces` > `Assignments`, I assign the `wg0 (WireGuard - Homelan)` interface and name it VPN. +This step is not required, but ease the configuration management for firewall rules. On both firewall, in `Interfaces` > `Assignments`, I assign the `wg0 (WireGuard - Homelan)` interface and name it *VPN*. + +Then in `Interfaces` > `VPN`, I enable this interface. + +Finally, in `Firewall` > `Groups`, I add this interface in the *Trusted* group. ### Firewall Rule To allow connections from outside, I need to create a firewall rule on the WAN interface: