Jump to content
Not connected, Your IP: 18.227.190.231

go558a83nk

Members2
  • Content Count

    2134
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    39

go558a83nk last won the day on June 24

go558a83nk had the most liked content!

2 Followers

About go558a83nk

  • Rank
    Advanced Member

Profile Information

  • Gender
    Not Telling

Recent Profile Visitors

168964 profile views
  1. Wireguard in Eddie? Or wireguard the app? Wireguard in Eddie
  2. make sure to try wireguard if you haven't already
  3. it wasn't me but that's really nice of somebody!
  4. The phoenix location is definitely spoofed. You can check the m247 site to see their list (or a map) of their actual locations. The Phoenix location as it is adds bandwidth but not route diversity since it's likely found by the same route as the LA location. Something better may be out there but maybe not. https://m247.com/eu/data-center-locations/
  5. I don't blame you for wanting to use wireguard especially on a router but openvpn using tls-crypt does connect easily from Egypt.
  6. have you confirmed it also announces the specified IP address to DHT peers or only tracker based peers?
  7. Thank you, this answers the question that had been rolling around in my head. I do think it would be good to allow users to pick the exit IP for each connection VPN connection.
  8. I currently have need to be able to connect to the same server and get the same exit IP address for both connections. I'm not using port forwarding. With this new system is it possible that one of the two connections will get a different exit IP?
  9. So is it working? The other thing that often breaks port forwarding on pfsense is if there are any rules in the openvpn or wireguard "group" firewall rules since those group rules override individual interface rules.
  10. I'm confused because you said "it is down a lot of time". But not enough for you to break the contract legally?
  11. You only need the first port forward rule, for your AirVPN interface, assuming that's the interface/gateway that the transmission device is allowed to use in policy routing. So, delete the one you made for your WAN. The only mistake I see is setting filter rule association to pass. You need to set that to "create new associated filter rule" and save. That'll create the necessary firewall rule. Of course, make sure transmission is listening at 192.168.3.102:19151 when you test to see if the port is open.
  12. I'm curious why you signed a contract that didn't give you the option of abandoning the contract if they didn't keep certain quality and uptime requirements?
  13. It used to be that you could use the same "device" for openvpn for multiple connections to the same server so long as you connect to different ports. I'm not sure if that's the same for wireguard... Because, as I'm sure you've realized, with wireguard, you have that pesky tunnel address that isn't auto created when you connect like with openvpn. So, yes, you have to make a new "device" for each wireguard tunnel you want to have on your pfsense box. But, the good news is that if you want to switch to a different AirVPN server, whether it's openvpn or wireguard, all you have to do is change the IP address of the endpoint/server. (with wireguard you need to disable the peer first, in my experience)
  14. Neither AirVPN's port open test nor yougetsignal's port open test will show "green" unless your whole chain is working and your server (qbit) is listening and responds to the query. This is important. Your server must be up and responding. So if things seem correct on pfsense then then problem is somewhere else, that's my thought.
  15. yeah, for me the group rules section is empty. but the individual interface gets auto created by using the associated filter rule option in the port forward. your problem may be due to a firewall on the unraid box and/or the qbit container?
×
×
  • Create New...