Buongiorno,
I have build a network with 3 MikroTik routers the names are:
GreatWall: LAN 172.16.0.0/26 - WG ADD 10.10.12.1
HellsGate: LAN 172.16.10.0/26 - WG ADD 10.10.12.2
FortKnox: LAN 172.16.20.0/27 - WG ADD 10.10.12.3
This “mesh” connection is called Fireloop.
Communication between devices across the different LANs works perfectly — for example, 172.16.0.10 can reach any device in the other LANs through the Fireloop tunnels.
The issue concerns WinBox management: I’m unable to access one of the other routers via WinBox through the Fireloop tunnels.
For clarification, when I use my Mac, I can establish a dedicated tunnel between the Mac and one router at a time (non-mesh configuration). In that setup, WinBox access works correctly when the proper filter rule is applied.
4 ;;; Allow WinBox over WG Fireloop
chain=input action=accept protocol=tcp in-interface-list=HWG dst-port=8291 log=no log-prefix=""
(HWG is the interface lists of all my WireGuard interfaces)
But when the Mac doesn’t have a dedicated (“point-to-point”) WireGuard tunnel active and is instead using the routers’ mesh network, I can only access the router that manages the LAN I’m physically connected to.
Is it possible to access the others as well? What am I missing?
EDIT: All these routers are behind a NAT, one with public IP and two no. All attempts to login via WinBox are aborting with “Wrong password” but of course is not correct. I’m pretty sure that the problem is here, the when a ping GreatWall from a device of the FortKnox LAN is the FortKnox itself to reply (<1ms)
FortKnox
Flags: X - disabled, I - invalid; D - dynamic
0 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none
GreatWall
Flags: X - disabled, I - invalid; D - dynamic
0 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface-list=WAN log=no log-prefix="" ipsec-policy=out,none
1 ;;; HTTP -> 172.16.0.16
chain=dstnat action=dst-nat to-addresses=172.16.0.16 to-ports=80 protocol=tcp dst-address=192.168.30.2 dst-port=80 log=no log-prefix=""
2 ;;; HTTPS -> 172.16.0.16
chain=dstnat action=dst-nat to-addresses=172.16.0.16 to-ports=443 protocol=tcp dst-address=192.168.30.2 dst-port=443 log=no log-prefix=""
EDIT2: The clients of the LANs are able to ping each other but the routers aren’t able to ping both routers and clients, this is strange…