I need to enable broadcast traffic via wireguard vpn.
I enabled proxy-arp on bridge and on port eth2 (included in the bridge and where my lan switch is connected with mikrotik router).
If I try to ping 255.255.255.255 or ex:172.16.200.255 from my wireguard client but the ping fail.
What type of traffic are you trying to achieve. Wireguard is not a PUSH function its a connection path between two points.
One end has to PULL, ask for information, the other side responds.
If both routers are Mikrotik, you can use EoIP on top of WireGuard, it’s very easy to set up. I successfully used it in the past as a proof of concept.
Interfaces - Add - EoIP, use MTU 1500. Remote address is WireGuard IP from the remote side. Tunnel ID can be anything but needs to match the other side. Repeat the same steps on the other side.
Bridge - Ports - Add your EoIP interface. Repeat on the other side. This will extend your L2 LAN across the VPN. If needed, you could instead create a new bridge and put specific interfaces there that you want to bridge together. But then they would not be part of the main LAN bridge.
The MTU on EoIP should be manually set to 1500, otherwise it will automatically lower it, which will lower MTU on the bridge and cause issues and slowness.
As with any L2 stretching you need to be aware of potential issues. Make sure you block DHCP (destination UDP 67), otherwise hosts can get a wrong IP from the other side. There are several ways to block it. I blocked it before it leaves EoIP, so that it doesn’t even get sent over VPN.
Bridge - filters - forward chain - out interface: eoip - MAC protocol IP - IP protocol udp, dst port 67. Action - drop.
Repeat on the other side.
The packets will be fragmented, there is no way around it since you have MTU 1500 on the LAN bridge, but WireGuard tunnel can’t fit 1500. For lighter traffic it shouldn’t be an issue. In my tests even heavier traffic was working fine, just higher CPU usage on the routers.
You could enable EoIP tunnel just for gaming and then disable it when done.