Dont need ovpn, all can be done with wg and firewall rules and a good config.
- If you look at your config you have some places where the router is telling you there are problems like
/interface bridge vlan
add bridge=BR1 tagged=BR1 untagged=
ether3,ether4,ether5,wlan-SOHO-5G,wlan-SOHO-2G,ether2 vlan-ids=10*
add bridge=BR1 tagged=BR1,ether2 untagged=*E,*10 vlan-ids=20
Should be:
/interface bridge vlan
add bridge=BR1 tagged=BR1 untagged=ether2,ether3,ether4,ether5,wlan-SOHO-5G,\
wlan-SOHO-2G,ether2 vlan-ids=10
add bridge=BR1 tagged=BR1,ether2 untagged=wlan-GUEST-5G,\
wlan-GUEST-2G vlan-ids=20
-
This rule often causes issues and should be set to NONE.
/interface detect-internet
set detect-interface-list=all
-
If you want your wireguard connection, when accessing the router as admin, to be able to access the router, for config purposes, you need to add the wireguard interface to the BASE interface list!! Assuming you have at least some wireguard users that do not need access to the router for config purposes, we will deal with that in the input chain rules with a firewall address list.
/interface list member
add comment=defconf interface=ether1 list=WAN
add interface=SOHO_VLAN list=VLAN
add interface=GUEST_VLAN list=VLAN
add interface=HOMENET-WireGuard list=VLAN
+++++++++++++++++++++++++++++++++
add interface=SOHO_VLAN list=BASE
add interface=HOMENET-WireGuard list=BASE
-
Remove the persistent keep alive on the client peer settings for ROAMING
add allowed-address=192.168.66.7/32 comment="Roaming Profile"
interface=HOMENET-WireGuard name=Roaming persistent-keepalive=25s
public-key="BHm2Gk="
-
Looking at your current firewall address list, are you stating all the wireguard devices connecting are admin devices??
-
Firewall Review changes only shown:
/ip firewall filter
....
add action=accept chain=input comment="admin access" in-interface=list=BASE \
src-address-list=AUTHORIZED
....
add action=accept chain=forward comment="authorized to all" in-interface-list=BASE \
src-address-list=Authorized dst-address=192.168.16.0/24
The last rule there, replaces the one currently you have
- In your dstnat rules it is not clear to me what is the dst-address you are referring to?
You have not created a firewall address list entry for your WANIP, so I will assume it probably a my netname ip cloud address?
In any case you need to create a resolving firewall address list
/ip firewall address-list
add URL list=MyWAN
and all the rule should NOT Show dst-address=aa.bb.cc.dd
BUT should show dst-address**-list**=MyWAN
The way you have put it so far, indicates you have a static fixed WANIP, but clearly via the fact you have IP DHCP Client selected and no ip address line for wan, the WANIP seems to be a dynamic one.
- The other fundamental error you are making is MIXING UP ROUTER SERVICES with LAN SERVERS.
I see you have forwarded port 22 to a LAN device, BUT then you assign SSH addresses under IP service.
You need to be consistent. If using the router SSH service then get rid of dstnat rules, but if you are running SSH on your own LAN server then get rid of IP services for SSH.
SAME for WWW. I suspect this is the case because WWW on the router is not a secure access method and generally not recommended.
-
For winbox access I recommend just stating the subnets, the granularity is only needed on input chain rules.
-
If IVP6 is not needed, disable it in IPV6 settings and then get rid of all IPV6 address lists and firewall rules save two.
add chain=input action=drop
add chain=forward action=drop
++++++++++++++++++++++++++++++++++++++++++++++++++
In summary cannot see anyone thing that is clearly the problem, the rules although not what I would put dont necessarily prevent the connectivity you are looking for. Lets clean up what you have, give it another go, and then we can proceed from there.