Hello.
Tried asking about this in the Wireguard Add-on thread, but got no response. As far as I, as a total layman, can deduce, it very possibly isn’t even the problem with the Add-on, but with the HA.
I’ve got HAOS installed on two identical (pretty old) Intel NUCs (Pentium Silver j5005, 16GB RAM) on two different locations. Also have installed the Wireguard Add-on on both of them, configured to use them/it as a site-to-site VPN solution.
For about a year everything worked fine, the LOCAL_LAN clients could reach the REMOTE_LAN clients, LOCAL_LAN clients could reach the REMOTE_HA, REMOTE_LAN clients could reach the LOCAL_LAN clients and LOCAL_HA instance.
Suddenly, about a month (maybe a bit more) ago, the setup partially stopped working. The part, of course, that’s most important for me. REMOTE_HA can reach both LOCAL_HA and LOCAL_LAN clients, LOCAL_HA can reach both REMOTE_HA and REMOTE_LAN clients, but the clients themselves can’t reach each other nor the HA instance remote to them via the VPN. When doing traceroute from a client, the traffic reaches the HA instalnce local to the client, but just times out there. The ipables -S in the underlying OS shows that forward is enabled, the iproute in both HA instances shows traffic is to be routed to/through the add-on.
Please help. Thanks in advance.
EDIT: lans, pings, traceroutes
EDIT: iptables -S from HAOS_1
# iptables -S
-P INPUT ACCEPT
-P FORWARD DROP
-P OUTPUT ACCEPT
-N DOCKER
-N DOCKER-BRIDGE
-N DOCKER-CT
-N DOCKER-FORWARD
-N DOCKER-ISOLATION-STAGE-1
-N DOCKER-ISOLATION-STAGE-2
-N DOCKER-USER
-A FORWARD -j DOCKER-USER
-A FORWARD -j DOCKER-FORWARD
-A FORWARD -d 10.3.0.0/24 -j ACCEPT
-A FORWARD -d 192.168.1.0/24 -j ACCEPT
-A DOCKER -d 172.30.33.7/32 ! -i hassio -o hassio -p udp -m udp --dport 51820 -j ACCEPT
-A DOCKER -d 172.30.33.4/32 ! -i hassio -o hassio -p tcp -m tcp --dport 5050 -j ACCEPT
-A DOCKER -d 172.30.33.2/32 ! -i hassio -o hassio -p tcp -m tcp --dport 9080 -j ACCEPT
-A DOCKER -d 172.30.33.2/32 ! -i hassio -o hassio -p tcp -m tcp --dport 9050 -j ACCEPT
-A DOCKER -d 172.30.33.1/32 ! -i hassio -o hassio -p tcp -m tcp --dport 8884 -j ACCEPT
-A DOCKER -d 172.30.33.1/32 ! -i hassio -o hassio -p tcp -m tcp --dport 8883 -j ACCEPT
-A DOCKER -d 172.30.33.1/32 ! -i hassio -o hassio -p tcp -m tcp --dport 1884 -j ACCEPT
-A DOCKER -d 172.30.33.1/32 ! -i hassio -o hassio -p tcp -m tcp --dport 1883 -j ACCEPT
-A DOCKER -d 172.30.32.6/32 ! -i hassio -o hassio -p tcp -m tcp --dport 80 -j ACCEPT
-A DOCKER ! -i hassio -o hassio -j DROP
-A DOCKER ! -i docker0 -o docker0 -j DROP
-A DOCKER-BRIDGE -o hassio -j DOCKER
-A DOCKER-BRIDGE -o docker0 -j DOCKER
-A DOCKER-CT -o hassio -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A DOCKER-CT -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A DOCKER-FORWARD -j DOCKER-CT
-A DOCKER-FORWARD -j DOCKER-ISOLATION-STAGE-1
-A DOCKER-FORWARD -j DOCKER-BRIDGE
-A DOCKER-FORWARD -i hassio -j ACCEPT
-A DOCKER-FORWARD -i docker0 -j ACCEPT
-A DOCKER-ISOLATION-STAGE-1 -i hassio ! -o hassio -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP
-A DOCKER-ISOLATION-STAGE-2 -o hassio -j DROP
-A DOCKER-USER -j RETURN