Hi,
My home network setup:
The Fritzbox is a Fritz!Box 7530 with FRITZ!OS: 8.02.
The Fritzbox has an Internet connection.
The Fritzbox runs the DHCP server.
The Fritzbox has the IP address 192.168.178.1.
Behind the Fritzbox is a MikroTik router.
The MikroTik router is a MikroTik L009UiGS-RM with RouterOS v7.18.2
No WireGuard is used on the Fritzbox, and no Surfshark either.
WireGuard® and Surfshark are used on the MikroTik.
Port 51820 (UDP) is opened on the Fritzbox and forwarded to the MikroTik router.
The MikroTik router is set as an exposed host on the Fritzbox for testing purposes.
Problem: The MikroTik router cannot establish a handshake with the Surfshark server.
Last Handshake: 00:00:00
Router config attached
additonally, to the config below I run the following cmd but nothing changed (rooter rebooted):
/ip firewall filter add chain=input action=accept in-interface=ether1 protocol=udp dst-port=51820 comment="Allow WireGuard handshake from WAN"
==============
New info 16:19 h:
seems, like UDP packets from the Internet do not reach my MikroTik router.
so maybe, the problem is no MikroTik problem.
PS C:\Users\Irvin> $udp = New-Object System.Net.Sockets.UdpClient
PS C:\Users\Irvin> $bytes = [System.Text.Encoding]::UTF8.GetBytes("test123")
PS C:\Users\Irvin> $udp.Send($bytes, $bytes.Length, "", 51820)
[admin@MikroTik] > /log print
2025-11-05 15:14:29 system,info router rebooted by mac-msg(winbox):admin@F0:A7:31:D7:22:5B
2025-11-05 15:14:30 interface,info lo link up
2025-11-05 15:14:31 interface,info surfshark link up
2025-11-05 15:14:33 bridge,info hardware offloading activated on bridge "bridge" ports: ether4,ether3,ether2
2025-11-05 15:14:33 bridge,info hardware offloading activated on bridge "bridge" ports: ether5,ether6
2025-11-05 15:14:33 bridge,info hardware offloading activated on bridge "bridge" ports: ether7,ether8,sfp1
2025-11-05 15:14:35 interface,info ether1 link up (speed 1G, full duplex)
2025-11-05 15:14:36 interface,info ether7 link up (speed 1G, full duplex)
2025-11-05 15:14:36 dhcp,info dhcp-client on ether1 got IP address 192.168.178.200
2025-11-05 15:14:39 system,info,account user admin logged in from F0:A7:31:D7:22:5B via winbox
2025-11-05 15:14:39 system,info,account user admin logged in from F0:A7:31:D7:22:5B via winbox
2025-11-05 15:15:16 system,critical,info cloud change time Nov/05/2025 15:14:58 => Nov/05/2025 15:15:16
2025-11-05 16:17:30 system,info,account user admin logged in from F0:A7:31:D7:22:5B via winbox
2025-11-05 16:19:54 system,info,account user admin logged out from F0:A7:31:D7:22:5B via winbox
2025-11-05 16:19:54 system,info,account user admin logged out from F0:A7:31:D7:22:5B via winbox
2025-11-05 16:19:55 system,info,account user admin logged out from F0:A7:31:D7:22:5B via winbox
2025-11-05 16:20:53 system,info,account user admin logged in from 192.168.88.254 via winbox
2025-11-05 16:21:22 system,info,account user admin logged in from 192.168.88.254 via winbox
2025-11-05 16:22:04 system,info filter rule added by tcp-msg(winbox):admin@192.168.88.254/terminal (*11 = /ip firewall filter add action=log chain=input dst-port=518
20 protocol=udp)
[admin@MikroTik] >
Why?
Can anyone help?
MMM MMM KKK TTTTTTTTTTT KKK
MMMM MMMM KKK TTTTTTTTTTT KKK
MMM MMMM MMM III KKK KKK RRRRRR OOOOOO TTT III KKK KKK
MMM MM MMM III KKKKK RRR RRR OOO OOO TTT III KKKKK
MMM MMM III KKK KKK RRRRRR OOO OOO TTT III KKK KKK
MMM MMM III KKK KKK RRR RRR OOOOOO TTT III KKK KKK
MikroTik RouterOS 7.18.2 (c) 1999-2025
Press F1 for help
2025-11-05 13:31:19 system,critical,info cloud change time Nov/05/2025 13:31:00 => Nov/05/2025 13:31:19
[admin@MikroTik] > /export
2025-11-05 14:32:10 by RouterOS 7.18.2
software id = YE70-4H86
model = L009UiGS
serial number = xxxxxxx
/interface bridge
add admin-mac=04:F4:1C:3E:A5:4B auto-mac=no comment=defconf name=bridge
/interface wireguard
add listen-port=51820 mtu=1420 name=surfshark
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/port
set 0 name=serial0
/disk settings
set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/interface wireguard peers
add allowed-address=0.0.0.0/0 endpoint-address=at-vie.prod.surfshark.com endpoint-port=51820 interface=surfshark name=peer2 persistent-keepalive=25s public-key=
"m4kr4bkBJ48fGZkOr7I+a/53VQnb0U/hFbWQdK1KKGA="
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
add address=10.14.0.2 interface=surfshark network=10.14.0.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=162.252.172.57,149.154.159.92
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat out-interface=surfshark
/ip route
add dst-address=37.19.195.68 gateway=192.168.178.1
add dst-address=37.19.195.68 gateway=192.168.178.1
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" dst-port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/system clock
set time-zone-name=Europe/Vienna
/system note
set show-at-login=no
/system routerboard settings
set enter-setup-on=delete-key
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
[admin@MikroTik] >