Dear all,
Good day.
I have a WireGuard connection on my home MikroTik router. The internet connection from the ISP is directly set up on MikroTik with the ISP’s PPPoE username and password. Everything is working fine. However, when I connect to the WireGuard VPN, and then scan my LAN network (which is in the range 172.20.20.0/24), it shows a lot of LAN devices that are not related to me. It even shows the ISP servers in my 172.20.20.0/24 IP range.
I’m not sure what’s happening. This also occurs when I use the L2TP VPN. I think this might be a VPN leak.
THe title should be; Admin Has a Leaky Config: Dont blame the router LOL
Sounds more like an error in your configuration,
The client coming in if its allowed addresses=0.0.0.0/0 that usually means that its setup to allow a remote user to see all Router subnets and to go out local internet.
So you need to be clear on the requirements.
Typically one has no control over the client settings so expecting 0.0.0.0/0 is a safe approach.
This means you have to be very precise on any firewall rules associated to allow access only to desired end locations.
Hi Sir,
I have set my LAN network IP range to 172.20.20.0/24 in the WireGuard client settings, and I have attached an image for reference. Is this enough, or do I need any firewall filter rules to prevent leakage?
As hinted here but maybe not explicitly enough said:
show your sanitized config of your router (remove sensitive info like public IP, serial, passwds, …). Don’t leave out any parts which you think are not relevant. It doesn’t work for you so you do not know what is relevant and what not.
precisely indicate what are your requirements with that VPN connection. Who can come in ? How ? What can they do ? What should they not be able to do ?
"Simply, I have a wireless AP in my network, and the IP range is 172.20.20.0/24. It’s only 20 APs from 172.20.20.11-30, but Advanced IP Scanner shows many IPs, which are not in my network. Even when I hit the IP in the browser, for example, 172.20.20.11, it should open the Wireless AP, but it opens the Dell server. But I didn’t have. I’m sure it is my ISP network, and either ISP have the same IP ranges for their server, but why is it discoverable on my network
Why two bridges?
Remove WAN from silly second bridge.
Why do you think you can have two subnets on the same bridge, 10.10 and 172.20 add address=10.10.10.1/24 interface=bridge_LAN network=10.10.10.0
add address=192.168.216.1/24 interface=wireguard-vpn network=192.168.216.0
add address=172.20.20.1/24 interface=bridge_LAN network=172.20.20.0
Furthermore you should also know that wireguard peers are to identify remote addresses
a. remote subnets local users need to reach
and/or
b. remote subnets requiring access to local subnets etc.
So to see any local addresses in wireguard peers is wrongo.
You have been configuring for a while now, and should know better.
You also know better than making wireguard available to the internet on the wan side a serious security mistake!!
Provide a more useful config cleaned up and will assist with it then… ( and also at least default firewall rules).