That is my allowed IPs setting. I can't find block-local or anything similar in my wireguard settings. Do I need to switch to the fdroid release or side load from github?

Reply to this note

Please Login to reply.

Discussion

Use a Local Firewall:

a. If your device is rooted, you can use iptables to block all outbound and inbound multicast traffic.

b. The rule might look something like: iptables -A OUTPUT -d 224.0.0.0/4 -j DROP.

WireGuard Configuration:

a. Make sure you are not allowing traffic to the local network (e.g., AllowedIPs should not contain your local subnet).

Create a Specific VPN Profile:

a. On Android, you can create a specific VPN profile that does not allow traffic outside the tunnel (i.e., a full-tunnel setup).

Not rooted.

That is the opposite of how I read the wireguard docs. I thought it should be that allowed IPs are destination ranges that must pass through the VPN. So the global default *should* do the trick.

Guide you recommend for this one? The mixed meanings of the word profile in the context is making search hard.