Short overview:
Problem: When connected via wireguard can access devices on network but not router for management purposes. Can ping router and receive reply, but cannnot connect via winbox or ssh, both work when connected directly to Management VLAN.
Network overview: Internet–>ISP Arris Modem/Gateway(in bridge mode)→ hap ax3 → Netgear (gs108T) →Netgear WAX615PA access point.
VLANS configured in router switch and access point.
Solutions tried: a bunch, but specifically have two rules for allowing wireguard interface
add comment=”Wireguard lan list” interface=wireguard1 list=LAN
In firewall also have:
add action=accept chain=input comment="Wireguard Port Forward" dst-port=xxxxx \ protocol=udp
add action=accept chain=input comment=\ "Allow router access from Wireguard interface" connection-state=new \ dst-port=8291 in-interface=wireguard1 protocol=tcp
Full config is as follows, but realize I’m new to RouterOS and networking in general, also some stuff is as has been recently changed trying to get this working so some things don’t match comments/don’t make sense I’m sure.
# 2025-10-09 21:27:27 by RouterOS 7.20
# software id = Y9EX-ZF9X
#
# model = C53UiG+5HPaxD2HPaxD
#
/interface bridge
add admin-mac=xx:xx:xx:xx:xx:xx auto-mac=no comment=defconf name=bridge \
protocol-mode=none vlan-filtering=yes
/interface wireguard
add listen-port=ppppp name=wireguard1
/interface vlan
add interface=bridge name=CCTV vlan-id=660
add interface=bridge name="Home Office" vlan-id=110
add interface=bridge name=IoT vlan-id=440
add interface=bridge name=Management vlan-id=10
add interface=bridge name="Personal Devices" vlan-id=220
add interface=bridge name="Streaming Devices" vlan-id=330
add interface=bridge name="Xmas Lights" vlan-id=550
/interface ethernet switch
set 0 cpu-flow-control=yes
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wifi security
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=xxxx
/interface wifi
set [ find default-name=wifi1 ] channel.skip-dfs-channels=10min-cac \
configuration.country="United States" .mode=ap .ssid=xxxx disabled=no \
security=xxxx security.authentication-types=wpa2-psk,wpa3-psk .ft=\
yes .ft-over-ds=yes
set [ find default-name=wifi2 ] channel.band=2ghz-ax .skip-dfs-channels=\
10min-cac configuration.country="United States" .mode=ap .ssid=xxxx \
disabled=no security=xxxx security.authentication-types=wpa2-psk \
.ft=yes .ft-over-ds=yes
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=dhcp_pool1 ranges=192.168.20.2-192.168.20.254
add name=dhcp_pool2 ranges=10.10.20.2-10.10.20.254
add name=dhcp_pool3 ranges=10.10.10.2-10.10.10.254
add name=dhcp_pool4 ranges=192.168.10.2-192.168.10.254
add name=dhcp_pool5 ranges=192.5.51.2-192.5.51.254
add name=dhcp_pool6 ranges=192.168.40.2-192.168.40.99
add name=dhcp_pool7 ranges=192.168.30.2-192.168.30.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge lease-time=1h name=defconf
add address-pool=dhcp_pool1 comment="Home Office" interface="Home Office" \
name=dhcp1
add address-pool=dhcp_pool2 comment="Xmas Lights" interface="Xmas Lights" \
name=dhcp2
add address-pool=dhcp_pool3 comment=IoT interface=IoT name=dhcp3
add address-pool=dhcp_pool4 comment=Management interface=Management name=\
dhcp4
add address-pool=dhcp_pool5 comment="Personal Devices" interface=\
"Personal Devices" name=dhcp5
add address-pool=dhcp_pool6 comment=CCTV interface=CCTV name=dhcp6
add address-pool=dhcp_pool7 comment="Streaming Devices" interface=\
"Streaming Devices" name=dhcp7
/interface bridge port
add bridge=bridge comment="Management Port" hw=no interface=ether2 pvid=660
add bridge=bridge comment="NetGear AP" interface=ether3 trusted=yes
add bridge=bridge comment=BoomCT interface=ether4 pvid=660
add bridge=bridge comment="Switch Trunk Line" interface=ether5
add bridge=bridge comment=defconf interface=wifi1 pvid=660
add bridge=bridge comment=defconf interface=wifi2 pvid=220
/interface bridge settings
set use-ip-firewall=yes
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=bridge comment="Home Office" tagged=bridge vlan-ids=110
add bridge=bridge comment="Personal Devices" tagged=ether5,ether3,bridge \
untagged=wifi2 vlan-ids=220
add bridge=bridge comment="Streaming Devices" tagged=ether5,ether3,bridge \
vlan-ids=330
add bridge=bridge comment=IoT tagged=ether5,ether3,bridge vlan-ids=440
add bridge=bridge comment="Xmas Lights" tagged=ether5,bridge,ether3 vlan-ids=\
550
add bridge=bridge comment=CCTV tagged=ether5,ether3,bridge untagged=wifi1 \
vlan-ids=660
add bridge=bridge comment=Management tagged=ether5,ether3,bridge untagged=\
ether4 vlan-ids=10
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add comment=defconf interface=Management list=LAN
add comment="Wireguard lan list" interface=wireguard1 list=LAN
/interface ovpn-server server
add mac-address=FE:xx:xx:xx:xx:xx name=ovpn-server1
/interface wireguard peers
add allowed-address=192.168.60.2/32 client-address=192.168.60.2/32 comment=\
"xxxx iphone" endpoint-address=xx.xx.xx.xx endpoint-port=xxxxx \
interface=wireguard1 name=peer3 private-key=\
"KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK=" public-key=\
"KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK="
add allowed-address=192.168.60.3/32 client-address=192.168.60.3/32 \
client-keepalive=25s comment="xxxx Iphone" endpoint-address=\
xx.xx.xx.xx endpoint-port=xxxxxx interface=wireguard1 name=peer4 \
private-key="KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK=" public-key=\
"KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK="
add allowed-address=192.168.60.4/32 client-address=192.168.60.4/32 comment=\
"Linux Laptop" endpoint-address=xx.xx.xx.xx endpoint-port=xxxxx \
interface=wireguard1 name=peer6 private-key=\
"KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK=" public-key=\
"KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK="
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
add address=192.5.51.1/24 interface="Personal Devices" network=192.5.51.0
add address=192.168.10.1/24 interface=Management network=192.168.10.0
add address=192.168.20.1/24 interface="Home Office" network=192.168.20.0
add address=192.168.30.1/24 interface="Streaming Devices" network=\
192.168.30.0
add address=192.168.40.1/24 interface=CCTV network=192.168.40.0
add address=10.10.10.1/24 interface=IoT network=10.10.10.0
add address=10.10.20.1/24 interface="Xmas Lights" network=10.10.20.0
add address=192.168.60.1/24 interface=wireguard1 network=192.168.60.0
/ip arp
add address=192.168.40.101 interface=CCTV mac-address=xx:xx:xx:xx:xx:xx
add address=192.168.40.82 interface=CCTV mac-address=xx:xx:xx:xx:xx:xx
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server lease
add address=10.10.20.2 mac-address=xx:xx:xx:xx:xx:xx server=dhcp2
/ip dhcp-server network
add address=10.10.10.0/24 gateway=10.10.10.1
add address=10.10.20.0/24 gateway=10.10.20.1
add address=192.5.51.0/24 gateway=192.5.51.1
add address=192.168.10.0/24 gateway=192.168.10.1
add address=192.168.20.0/24 gateway=192.168.20.1
add address=192.168.30.0/24 comment=Streaming gateway=192.168.30.1
add address=192.168.40.0/24 dns-server=1.1.1.1 gateway=192.168.40.1
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\
192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall address-list
add address=192.5.51.0/24 list=local-networks
add address=10.10.10.0/24 list=local-networks
add address=10.10.20.0/24 list=local-networks
add address=192.168.20.0/24 list=local-networks
add address=192.168.30.0/24 list=local-networks
add address=192.168.40.0/24 list=local-networks
add address=192.168.10.0/24 list=local-networks
add address=192.168.60.0/24 list=ManagementList
add address=192.168.10.0/24 list=ManagementList
add address=192.168.60.0/24 list=local-networks
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input comment="Wireguard Port Forward" dst-port=xxxxx \
protocol=udp
add action=accept chain=input comment=\
"Allow router access from Wireguard interface" connection-state=new \
dst-port=8291 in-interface=wireguard1 protocol=tcp
add action=accept chain=input comment=\
"Allow router config access only from Management VLAN" connection-state=\
new in-interface=Management src-address-list=ManagementList
add action=accept chain=input comment="Allow LAN DNS queries - TCP" \
connection-state=new dst-port=53 in-interface-list=LAN protocol=tcp
add action=accept chain=input comment="Allow LAN DNS queries - UDP" \
connection-state=new dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input comment="Allow new NTP service" \
connection-state=new dst-port=123 in-interface-list=LAN protocol=udp
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=drop chain=input comment="drop all else"
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
disabled=yes ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
disabled=yes ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=accept chain=forward comment=\
"Allow WireGuard devices access to Camera Server" connection-state=new \
log=yes out-interface=all-vlan src-address=192.168.60.0/24
add action=accept chain=forward comment="Allow traffic across camera vlan" \
dst-address=192.168.40.0/24 src-address=192.168.40.0/24
add action=drop chain=forward comment="Prevent Camera Server Internet Access" \
connection-state=new disabled=yes out-interface=ether1 src-address=\
192.168.40.97
add action=accept chain=forward comment=\
"Allow management to access all vlans" in-interface=Management \
out-interface=all-vlan
add action=accept chain=forward comment=\
"allow personal devices access to other vlans" in-interface=\
"Personal Devices" out-interface=all-vlan
add action=drop chain=forward comment=\
"Drop new connections from Minecraft Server" connection-state=new \
out-interface=all-vlan src-address=192.168.40.82
add action=drop chain=forward comment="drop new inter-VLan traffic" \
connection-state=new in-interface=CCTV out-interface=all-vlan
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set sip disabled=yes
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system clock
set time-zone-name=America/Chicago
/system identity
set name=xxxx
/system ntp client
set enabled=yes
/system ntp server
set broadcast=yes broadcast-addresses=192.168.10.1 enabled=yes multicast=yes
/system ntp client servers
add address=time.cloudflare.com
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
Longer version/more info:
So this network was setup a couple of years ago. I followed some tutorial but I don’t even know which one now. Originally it was behind the ISP modem which was not bridged. After adding a server I wanted to be able to access it from outside my network but didn’t want to port forward so decided to try out wireguard. Had to bridge ISP modem to get that to work. The network is now outdated compared to what I need/use. There is no more home office for instance. The CCTV network has all the servers on it currently, not just the CCTV server, etc. I want to restructure the network to make sense but I have the most time to work on it while I’m away from it. So I am trying to now access the router config itself from the wireguard1 interface. I can access the router only from the Management VLAN currently and cant’ figure out why I can’t also get wireguard working. I realize I have a rule that says it allows only the management vlan to access the router but if I delete that rule I lose the ability to access the router over the wifi network completely and have to use ethernet to get into the router. While I have had this setup for about 2 years, I didn’t mess with it much until about 3 months ago…that was when my NVR died and I decided to setup a server instead. So I don’t remember too much about what I changed when this was first setup, and as I stated I am extremely new to both mikrotik and networking in general. I am hoping I have a simple config issue that I have missed. I have looked through several posts on this forum and most seem to suggest I need to add the wireguard interface to the LAN list and create two firewall rules-one for the access port to allow wireguard traffic through and a second to allow wireguard traffic to access router input chain. I believe I have these rules configured but it still doesn’t work. So I was hoping that maybe somebody could review my config and see what I’m missing? Thanks in advance!
P.S. I hope I didn’t remove something that was needed, I tried to obfuscate anything that was directly exposed to the WAN with X’s or K’s or something similiar.