Last adaptation to the version: 12.7.1
- New option as peer: Local_User
- 11.2025
- Correcting the IP address for peer networks in step 3
Last adaptation to the version: 12.6.2
- New function to secure the ports in use: Connection Rate Limit
- 12.2024
- Note on system time added to Keepalive
notempty
Key management
When creating a WireGuard connection, there are several options for generating and managing the necessary key values. Each of these options has its advantages and disadvantages.
For two options, the required private or public key value is created directly in the WireGuard connection setup wizard.
The third option requires existing keys of type x25519.
Create WireGuard connection
Given may the following configuration:
| UTM network | location B | Transfer network | |
|---|---|---|---|
| FQDN | a.vpn.anyideas.de | b.vpn.anyideas.de | – |
| Local network IPv4 | 10.1.0.0/16 | 10.2.0.0/16 | 10.0.1.0/24 |
| Local tunnel IPv4 | 10.0.1.1/24 | 10.0.1.2/24 | – |
| Local network IPv6 | fd00:a:0:0::0/64 | fd00:b:0:0::0/64 | fd00:0:0:0::0/64 |
| Local tunnel IPv6 | fd00:0:0:0::1/128 | fd00:0:0:0::2/128 | – |
| UTM | Roadwarrior | Transfer network | |
|---|---|---|---|
| FQDN | a.vpn.anyideas.de | – | – |
| Local network IPv4 | 10.1.0.0/16 | – | 10.0.1.0/24 |
| Local tunnel IPv4 | 10.0.1.1/24 | 10.0.1.201/24 | – |
| Local network IPv6 | fd00:a:0:0::0/64 | – | fd00:0:0:0::0/64 |
| Local tunnel IPv6 | fd00:0:0:0::1/128 | fd00:0:0:0::C9/128 | – |
Configuration UTM
|
UTM network Step 3 - Peer
New as of v12.7.1 | |||
| Caption | Value | Description | ![]() |
|---|---|---|---|
| Peer type: | Local user as peer | ||
| Open user dialogue: | Off | Opens the user settings after completing the wizard | |
| Exits the wizard | |||
| WireGuard can then be configured for the desired user under button by clicking edit. More detailed information can be found here. | |||
Step 4 - Advanced settingsUTM network Step 4 - Advanced settings
| |||
| Create routes to the peer's networks: | Yes No |
Activation is not required. A Roadwarrior can be reached directly via its tunnel IP address. A route is therefore not necessary. |
![]() |
Initial situation It may be desirable to set the routes for VPN connections only when the connection is actually established.
CLI command Connection via SSH or via menu : route get determines the correct connection ID route set id <ID> flags BLACKHOLE_IF_OFFLINE E.G.: route set id "2" flags BLACKHOLE_IF_OFFLINE | |||
| Generate zones: | Yes | Generates a new zone for the WireGuard port | |
| Zone Name: | wireguard-wg0 | Name for the WireGuard connection zone | |
| Generate network objects for peer: | Yes »wg-net-peer_rw»wg-net6-peer_rw |
Creates Yes button when enabled for network objects (IPv4 and if necessary IPv6) of the remote terminal. Automatic suggestion can also be changed. | |
| Network group: | wg0-network | Network group of the connection is displayed | |
| Generate rules between peer and internal-networks: | No | Generates Yes autogenerated rules that make commissioning easier. notempty It is essential to replace these rules with your own rules that allow only necessary services with necessary network objects. These custom rules must always be created with the WireGuard interface and the internal network, even if the WireGuard tunnel leads to a DMZ network. | |
| Exits the wizard
| |||
Configuration roadwarriorDownload clientDownload the client under https://www.wireguard.com/install WireGuard configuration clientWireGuard Client
| |||
| Open client and add a blank tunnel |
![]() [Interface]
PrivateKey = # PrivatKey für RW
Address = # Netz-IP für den Roadwarrior
DNS = # IP_DES_DNServers (optional), # Search Domain (optional)
MTU = 1420 # (optional) | ||
| Name: | wg-vpn-UTM_Network | Freely selectable name (without spaces) | |
| Public key: | sFWO… …LmDM= | ||
| Configuration window [Interface] | |||
| PrivateKey = | uIp… …9E3XA= | When creating a blank tunnel, a PrivateKey is assigned automatically The PrivateKey can be exported on the UTM in RAW format and then entered here. | |
| Address = | 10.0.1.201/32 | Tunnel IP for the roadwarrior | |
| DNS = | 10.0.1.1, beispiel.local | Optional Server via which the client should resolve names during an existing connection. In addition, a search domain can be entered here so that computers can be found using their host name without specifying the FQDN. Entries are separated by a comma and a space. | |
| MTU = | 1420 | Optional Defines the size of a data packet. Must be between 1300 and 1500. 1420 is the default. | |
| ListenPort = | 51820 | Optional' The port on which data reaches the client. Is assigned dynamically and unset by the client. The same port can be used on the server and client side (even with multiple clients). | |
| [Peer] | |||
| PublicKey = | beN9ikz… …Do= | PublicKey of the UTM | |
| PresharedKey = | 29… …/Wipaxs= | PresharedKEy from the UTM | |
| AllowedIPs = | 10.1.0.0/16 | Local net IPs behind the UTM | |
| Endpoint = | a.vpn.anyideas.de:51820 | IP/Hostname of the UTM :PPort of the WG instance | |
| persistentkeepalive = | 25 | Keepalive | |
Widget
There is a widget in the admin interface for the overview of WireGuard connections. Further information can be found in the Wiki article UTM Widget.
Connection Rate Limit
Throttling of access from certain source IPs to recurring ports
notempty
The function can initially only be configured via the CLI
SSL-VPN accesses can be protected against aggressive scans or login attempts, for example.

From v12.6.2, the UTM can limit the number of TCP and/or UDP connections from an external IP address to one port.
The following conditions apply:
- Only incoming connections for which a default route exists are monitored
- The connections from an IP address to a port of the UTM are counted within one minute
- When activated, 5 connections / connection attempts per minute are permitted.
The connections are then limited:- The additionally permitted connections are distributed evenly within 60 seconds of the first connection.
- With a CONNECTION_RATE_LIMIT value of 20, an additional connection is added every 3 seconds.
- 10 seconds after the first login, 3 further connections could be established (each from the same IP address to the same destination port)
- Blocking an IP address only affects access to the port that has been used too often.
Other ports can still be accessed.
- The function is activated by default for new installations on 20 UDP connections / minute on all ports
- For Updates the function must be manually activated
| extc-Variable | Default | Description |
|---|---|---|
| CONNECTION_RATE_LIMIT_TCP | 0 | Number of permitted TCP connections of an IP address per port 0 = Function deactivated, no blocking is performed |
| CONNECTION_RATE_LIMIT_TCP_PORTS | Ports to be monitored. Empty by default=all ports would be monitored (if activated). Individual ports are separated by spaces: [ 1194 1195 ] | |
| CONNECTION_RATE_LIMIT_UDP | 20 / 0 Default setting for new installations from v12.6.2: 20 For update installations the value is 0, so the function is deactivated. |
Number of permitted UDP connections of an IP address per port |
| CONNECTION_RATE_LIMIT_UDP_PORTS | Ports to be monitored. Empty by default=all ports are monitored (only for new installations!). Individual ports are separated by spaces: [ 1194 1195 ] |
Configuration with CLI commands
| CLI command | Function |
|---|---|
| extc value get application securepoint_firewall Alternatively as root user: spcli extc value get application securepoint_firewall | grep RATE |
Lists all variables of the securepoint_firewall application. The variables beginning with CONNECTION_RATE_LIMIT_ are responsible for the connection limit. application |variable |value --------------------+-------------------------------+----- securepoint_firewall |… |… |CONNECTION_RATE_LIMIT_TCP |0 |CONNECTION_RATE_LIMIT_TCP_PORTS| |CONNECTION_RATE_LIMIT_UDP |20 |CONNECTION_RATE_LIMIT_UDP_PORTS| |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_TCP value 20 system update rule |
Limits the allowed number of TCP connections from a single IP address to a specific port to 20 per minute
A change is made directly by a rule update. The value must not be set to 0 first! |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_TCP value 0 system update rule |
Deactivates the monitoring of TCP connections |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_TCP_PORTS value [ 443 11115 ] system update rule |
Restricts the monitoring of TCP connections to ports 443 and 11115 There must be spaces before and after the square brackets [ ]! |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_TCP_PORTS value [ ] system update rule |
There must be spaces before and after the square brackets [ ]! |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_UDP value 20 system update rule |
Limits the allowed number of UDP connections from a single IP address to a specific port to 20 per minute Default setting for new installations from v12.6.2: 20 For update installations the value is 0, so the function is deactivated. The value must not be set to 0 first! |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_UDP value 0 system update rule |
Deactivates the monitoring of UDP connections |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_UDP_PORTS value [ 1194 1195 ] system update rule |
Restricts the monitoring of UDP connections to ports 1194 and 1195. (Example for 2 created SSL-VPN tunnels). There must be spaces before and after the square brackets [ ]! |
| extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_UDP_PORTS value [ ] system update rule |
There must be spaces before and after the square brackets [ ]! |
extc value set application securepoint_firewall variable CONNECTION_RATE_LIMIT_TCP value 20 notempty Finally, the CLI command system update rule must be entered so that the values in the rules are applied. |
For example, to allow a maximum of 20 connections per minute per IP address and port. For TCP, monitoring is restricted to ports 443 and 11115. All ports are monitored for UDP connections. |













