Hi! I set up the ProtonVPN wireguard on the 7.3.1 RouterOS (map 2nD router). The internet works well, pings run but traceroute does not work.
Wlan-client interface (by dhcp: 192.168.2.111/24, gw 192.168.2.1) works as WAN.
LAN address is 192.168.19.1/26.
Mikrotik wg address is 10.2.0.2/32, ProtonVPN wg host is 10.2.0.1, pingable and traced fine.
When I do traceroute for any other Internet IP then all I get is timeouts:
[user@mikrotik] > /tool/traceroute
address: 1.1.1.1
Columns: LOSS, SENT, LAST
# LOSS SENT LAST
1 100% 6 timeout
2 100% 5 timeout
3 100% 5 timeout
4 100% 5 timeout
5 100% 5 timeout
-- [Q quit|D dump|C-z pause]
While traceroute through the usual WAN (with disabled wireguard) works fine:
[user@mikrotik] > /tool/traceroute
address: x.y.z.97
Columns: ADDRESS, LOSS, SENT, LAST, AVG, BEST, WORST, STD-DEV
# ADDRESS LOSS SENT LAST AVG BEST WORST STD-DEV
1 192.168.2.1 0% 17 2.8ms 5.7 2.7 20.5 4.5
2 a.b.c.d 0% 17 13ms 14.4 9.2 30.9 5.5
3 e.f.g.h 0% 17 14.6ms 14.5 13.4 17.9 1.3
4 i.g.k.l 0% 17 17.6ms 17.5 12.7 26.5 4.4
5 195.22.214.165 0% 17 12.3ms 15 12.3 25.4 3.8
6 195.22.214.71 0% 17 33.6ms 36.3 32.2 55.2 5.7
7 m.n.k.194 0% 17 47.2ms 36.5 33.6 47.2 3.2
8 x.y.z.97 0% 17 34.1ms 37.5 33.6 67.6 7.7
Same behaviour when pinging/tracing on mikrotik, linux laptop Android device behind inside of the LAN.
I guess it is something with the NAT masquerades but my knowledge is not good enough to figure out the cause.
Here are the router settings.
[user@mikrotik] > /ip/address/ print
Flags: D - DYNAMIC
Columns: ADDRESS, NETWORK, INTERFACE
# ADDRESS NETWORK INTERFACE
;;; defconf
0 192.168.19.1/27 192.168.19.0 bridge
1 10.2.0.2/32 10.2.0.1 wg-proton-esp
2 D 192.168.2.111/24 192.168.2.0 wlan1-client
Wireguard configs:
[user@mikrotik] > /interface/wireguard/ print
Flags: X - disabled; R - running
0 R name="wg-proton-esp" mtu=1360 listen-port=13201 private-key="some key"
public-key="another key"
and the peers
[user@mikrotik] > /interface/wireguard/peers/ print
Flags: X - DISABLED
Columns: INTERFACE, PUBLIC-KEY, ENDPOINT-ADDRESS, ENDPOINT-PORT, ALLOWED-ADDRESS, PERSISTENT-KEEPALIVE
# INTERFACE PUBLIC-KEY ENDPOINT-ADDRESS ENDPOINT-PORT ALLOWED-ADDRESS PER
0 wg-proton-esp somekey PROTON_VPN_IP 51820 0.0.0.0/0 10s
10.2.0.1/32
[user@mikrotik] > /ip/route/ print
Flags: D - DYNAMIC; X, I, A - ACTIVE; c, s, d, y - COPY; H - HW-OFFLOADED
Columns: DST-ADDRESS, GATEWAY, DISTANCE
# DST-ADDRESS GATEWAY DISTANCE
0 As 0.0.0.0/0 10.2.0.1 2
D d 0.0.0.0/0 192.168.2.1 3
DAc 10.2.0.1/32 wg-proton-esp 0
DAc 192.168.2.0/24 wlan1-client 0
DAc 192.168.19.0/27 bridge 0
1 As PROTON_VPN_IP/32 192.168.2.1 1
[user@mikrotik] > /ip/firewall/nat/ print
Flags: X - disabled, I - invalid; D - dynamic
0 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface-list=WAN log=no log-prefix="" ipsec-policy=out,none
1 chain=srcnat action=masquerade out-interface=wg-proton-esp log=no log-prefix=""
[user@mikrotik] > /ip/firewall/filter/ print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; defconf: accept established,related,untracked
chain=input action=accept connection-state=established,related,untracked
2 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid
3 ;;; defconf: accept ICMP
chain=input action=accept protocol=icmp
4 ;;; defconf: accept to local loopback (for CAPsMAN)
chain=input action=accept dst-address=127.0.0.1
5 X ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN
6 X ;;; defconf: accept in ipsec policy
chain=forward action=accept ipsec-policy=in,ipsec
7 X ;;; defconf: accept out ipsec policy
chain=forward action=accept ipsec-policy=out,ipsec
8 ;;; defconf: fasttrack
chain=forward action=fasttrack-connection hw-offload=yes connection-state=established,related
9 ;;; defconf: accept established,related, untracked
chain=forward action=accept connection-state=established,related,untracked
10 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid
11 ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN
12 ;;; DNS Amplification attack
;;; http://forum.mikrotik.com/t/dns-amplification-attack/68310/1
chain=input action=drop protocol=tcp in-interface=wlan1-client dst-port=53 log=no log-prefix=""
13 ;;; DNS Amplification attack #2
;;; http://forum.mikrotik.com/t/dns-amplification-attack/68310/1
chain=input action=drop protocol=udp in-interface=wlan1-client dst-port=53 log=no log-prefix=""
Could You please help me to fix this issue?
Thank You in advance.