Hello!
May I ask for support for making this road warrior setup work?
There’s a Mikrotik router behind my ISP’s modem. Then some devices in the local subnet 192.168.0.0/24. If I am on the road, I would like to access some services which are running on devices in the local subnet.
I followed the official tutorial https://www.youtube.com/watch?v=vn9ky7p5ESM but some things are missing to make it work.
Same here: https://help.mikrotik.com/docs/spaces/ROS/pages/69664792/WireGuard#WireGuard-WireGuardinterfaceconfiguration
The only difference is, my wg subnet is at 172.33.0.0/24 instead of 192.168.100.0/24.
Gateway at 192.168.0.1.
I have two issues:
Issue 1) DNS provider in home subnet not working
Background: Client (Android) Peer is using split tunnel (e.g. allowed IPs is set to my local Home subnet 191.168.0.0/24)
Firewall rule was also made as in tutorial.
→ Goal: Browing to google.com does not use my tunnel. Navigate to 192.168.0.xxx will use tunnel.
The issue is: google.com is only loading if I use DNS 1.1.1.1, but not 192.168.0.1 unlike in the tutorial. I thought the firewall rule
3 ;;; Allow wireguard
chain=input action=accept protocol=udp dst-port=13231 log=no log-prefix=""
is supposed to make this work?
Issue 2) Main issue - No internet
Background:
- Client (Android) Peer is using split tunnel (e.g. allowed IPs is set to my local Home subnet 191.168.0.0/24)
- Client wireguard Interace DNS 1.1.1.1
- Rx/Tx in interface list shows some packages
The issue is, pages don’t load
All my config with filter rules, LAN list etc should handle this… but something seems missing.
Firewall should allow DNS lookup, but I guess here is the issue.
Maybe rule #3 and #4 are not needed because I also added the wg1 interface to LAN.
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; defconf: accept established,related,untracked
chain=input action=accept connection-state=established,related,untracked
2 ;;; defconf: accept ICMP
chain=input action=accept protocol=icmp
3 ;;; Allow wireguard
chain=input action=accept protocol=udp dst-port=13231 log=no log-prefix=""
4 X ;;; Allow wireguard traffic
chain=input action=accept src-address=172.33.0.0/24 log=no log-prefix=""
5 ;;; defconf: accept to local loopback (for CAPsMAN)
chain=input action=accept dst-address=127.0.0.1
6 ;;; defconf: accept in ipsec policy
chain=forward action=accept ipsec-policy=in,ipsec
7 ;;; defconf: accept out ipsec policy
chain=forward action=accept ipsec-policy=out,ipsec
8 ;;; defconf: accept established,related, untracked
chain=forward action=accept connection-state=established,related,untracked
9 ;;; internet traffic
chain=forward action=accept in-interface-list=LAN out-interface-list=WAN log=no log-prefix=""
10 ;;; allow port forwarding
chain=forward action=accept connection-nat-state=dstnat log=no log-prefix=""
11 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid log=no log-prefix=""
12 ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
13 ;;; Disable internet access for the IKEA TRADFRI
chain=forward action=drop out-interface-list=!LAN src-mac-address=B8:D7:AF:2A:AE:65 log=no log-prefix=""
14 ;;; defconf: fasttrack
chain=forward action=fasttrack-connection hw-offload=yes connection-state=established,related
15 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid
16 X ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN log=no
log-prefix=""
17 ;;; drop all else
chain=forward action=drop log=no log-prefix=""
Ignore #3. wireguard_internet is a different wg connection that goes to a VPN server somewhere.
# LIST INTERFACE
0 LAN bridge
1 WAN ether1
2 WAN wireguard_internet
3 LAN wg1
/interface wireguard print
Flags: X - disabled; R - running
0 R name="wg1" mtu=1420 listen-port=13231 private-key="xcvbbbcxcbvcxbxcbvxb"
public-key="CLPwjoImpOaxXr341gEpErlQ0Tt8eCCGXoN54EUQVTQ="
/interface/wireguard/peers> print
Columns: INTERFACE, PUBLIC-KEY, ENDPOINT-ADDRESS, ENDPOINT-PORT, ALLOWED-ADDRESS
# INTERFACE PUBLIC-KEY ENDPOINT-ADDRESS ENDPOINT-PORT ALLOWED-ADDRESS
0 wg1 vPGI9sommeGdNHp/cHI2gOpMInWDOJnGsm6XvLvN8m4= 0 172.33.0.2/32
/ip/address> print
Flags: D - DYNAMIC
Columns: ADDRESS, NETWORK, INTERFACE
# ADDRESS NETWORK INTERFACE
0 192.168.0.1/24 192.168.0.0 bridge
2 D xxx.xxx.xxx.xxx/24 xxx.xxx.xxx.xxx ether1
;;; Access to home network
3 172.33.0.1/24 172.33.0.0 wg1
Any setting tips that I could try are much appreciated!
Greetings
Thoru