+Start with a clean install of OpenWRT.
+After Luci is up, DO NOT configure wifi. Do NOT install wireguard yet. Install travelmate next. That's the only way I could figure out to make it actually work.
+Travelmate Doco is here: <https://github.com/openwrt/packages/blob/master/net/travelmate/files/README.md>
+Travelmate support thread is here: <https://forum.openwrt.org/t/travelmate-support-thread/5155/21>
+Make sure prereqs are satisfied (iwinfo, etc.) as per Doco...
+Install luci-app-travelmate (should pull in main dependencies).
+Set up **one** AP using normal Luci interface (not travelmate).
+I like to use a 2.4 GHz band at very low power. The theory is that the main WWAN backhaul will be less congested on a 5 GHz channel. Experience will tell if that holds up in a hotel situation. The obvious thing of setting up a second AP on the other band did not work for my GL-AR750. That may be due to a single radio not supporting simultaneous AP and STA or something, but in any event I haven't chased it down.
+Dealing with AP and STA being on different channels is also somewhat of a mystery at the moment. Perhaps that's confounding the "AP on the same radio as the STA" issue???
+Use travelmate to configure WWAN STA's. Travelmate scans for signals in its "Wireless Stations" panel, and allows you to connect. There is a scriptable captive portal thingy, but that looks to be for more permanent things than I want to deal with when I'm tired and setting things up for a few nights in a hotel and just want to get connected to the net.
+I haven't figured out how to deal with VPN and captive portal stuff yet, but I **THINK** you simply need to change the firewall to point to the WAN instead of the WG zone to let the captive portal do it's thing. Once the MAC number of your travel router is known to the WWAN, that *should* be enough to let the whole mess to work.
+Then re-configure the firewall to use WG.
+Getting DNS through wg was a bit of a hit-and-miss thing. My current config (as of 13 November 2019) for Travelo appears to be working.
+Just for reference, most of the instructions for getting WG installed on OpenWRT were the obvious modifications for my Algo setup to these instructions: <https://www.azirevpn.com/support/guides/router/openwrt/wireguard>.
+I'm glad I took time to figure this out before trying it out live. I am somewhat dubious of being able to go to arbitrary captive portals because I had some funky thing going on when I tried the campus wifi setup. But, maybe that was all misconfiguration that has since been massaged out.
+Some config files from my travel router, with some sensitive stuff replaced with the text REDACTED.
+config travelmate 'global'
+ option trm_proactive '1'
+ option trm_netcheck '0'
+ option trm_iface 'trm_wwan'
+ option trm_triggerdelay '2'
+ option trm_maxretry '5'
+ option trm_listexpiry '0'
+ option trm_minquality '35'
+ option trm_maxwait '30'
+ option trm_timeout '60'
+ option trm_rtfile '/tmp/trm_runtime.json'
+config wifi-device 'radio0'
+ option path 'pci0000:00/0000:00:00.0'
+config wifi-iface 'default_radio0'
+ option wpa_disable_eapol_key_retries '1'
+ option encryption 'psk2'
+config wifi-device 'radio1'
+ option path 'platform/qca953x_wmac'
+config wifi-iface 'default_radio1'
+ option wpa_disable_eapol_key_retries '1'
+ option encryption 'psk2'
+config wifi-iface 'radio0_RedRover_'
+ option network 'trm_wwan'
+ option encryption 'none'
+config wifi-iface 'radio0_BC5_'
+ option network 'trm_wwan'
+ option encryption 'psk2'
+config interface 'loopback'
+ option ipaddr '127.0.0.1'
+ option netmask '255.0.0.0'
+config globals 'globals'
+ option ula_prefix 'REDACTED'
+ option netmask '255.255.255.0'
+ option ipaddr '192.168.42.1'
+ option device 'switch0'
+config interface 'trm_wwan'
+ option public_key 'REDACTED'
+ option description 'algoNewYul'
+ option endpoint_port '51820'
+ option endpoint_host 'REDACTED'
+ option route_allowed_ips '1'
+ list allowed_ips '0.0.0.0/0'
+ option persistent_keepalive '25'
+ option proto 'wireguard'
+ option private_key 'REDACTED'
+ option listen_port '51820'
+ list addresses '10.19.49.7/24'
+ option forward 'REJECT'
+ option forward 'ACCEPT'
+ option forward 'REJECT'
+ option network 'wan wan6 trm_wwan'
+ option name 'Allow-DHCP-Renew'
+ option name 'Allow-Ping'
+ option icmp_type 'echo-request'
+ option name 'Allow-IGMP'
+ option name 'Allow-DHCPv6'
+ option src_ip 'fc00::/6'
+ option dest_ip 'fc00::/6'
+ option name 'Allow-MLD'
+ option src_ip 'fe80::/10'
+ option name 'Allow-ICMPv6-Input'
+ list icmp_type 'echo-request'
+ list icmp_type 'echo-reply'
+ list icmp_type 'destination-unreachable'
+ list icmp_type 'packet-too-big'
+ list icmp_type 'time-exceeded'
+ list icmp_type 'bad-header'
+ list icmp_type 'unknown-header-type'
+ list icmp_type 'router-solicitation'
+ list icmp_type 'neighbour-solicitation'
+ list icmp_type 'router-advertisement'
+ list icmp_type 'neighbour-advertisement'
+ option limit '1000/sec'
+ option name 'Allow-ICMPv6-Forward'
+ list icmp_type 'echo-request'
+ list icmp_type 'echo-reply'
+ list icmp_type 'destination-unreachable'
+ list icmp_type 'packet-too-big'
+ list icmp_type 'time-exceeded'
+ list icmp_type 'bad-header'
+ list icmp_type 'unknown-header-type'
+ option limit '1000/sec'
+ option name 'Allow-IPSec-ESP'
+ option name 'Allow-ISAKMP'
+ option path '/etc/firewall.user'
+ option src_port '51820'
+ option name 'wireguard'
+ option dest_port '51820'
+ option forward 'REJECT'
+ option name 'AllowDnsViaWireguard'
+ option dest_ip '172.16.0.1'