Hello, just set up simple wireguard server on mikrotik. Now try to connect windows client to it. All is well, but client doesn’t see internal mikrotik net. Here my conf.
This is client profile
[Interface]
PrivateKey = KEY=
Address = 10.10.0.2/24
DNS = 1.1.1.1, 1.0.0.1
[Peer]
PublicKey = KEY=
AllowedIPs = 0.0.0.0/0
Endpoint = 2.2.2.2:13231
This is address lists
# 2023-09-01 12:09:40 by RouterOS 7.11.1
# software id = **ELIDED**
#
# model = RB3011UiAS
# serial number = **ELIDED**
/ip address
add address=2.2.2.2/30 interface=ether1 network=2.2.2.2
add address=192.168.188.1/24 interface=bridge1 network=192.168.188.0
add address=10.10.0.0/24 interface=wireguard1 network=10.10.0.0
Firewall
# 2023-09-01 12:02:34 by RouterOS 7.11.1
# software id = **ELIDED**
#
# model = RB3011UiAS
# serial number = **ELIDED**
/ip firewall address-list
add address=4.4.4.4 list=allow_ssh
/ip firewall filter
add action=accept chain=forward comment="WireGuard subnet share" dst-address=192.168.188.0/24 src-address=\
10.10.0.0/24
add action=accept chain=forward dst-address=10.10.0.0/24 src-address=192.168.188.0/24
add action=drop chain=input comment="drop DNS requests from internet" dst-port=53 in-interface=ether1 \
protocol=tcp
add action=drop chain=input dst-port=53 in-interface=ether1 protocol=udp
add action=drop chain=input comment="drop invalid" connection-state=invalid
add action=drop chain=forward connection-state=invalid
add action=accept chain=input comment="accept related established untracked" connection-state=\
established,related,untracked
add action=accept chain=forward connection-state=established,related,untracked
add action=accept chain=input comment="accept Winbox from inside" dst-port=1303 in-interface=!ether1 \
protocol=tcp
add action=accept chain=input comment="accept ICMP from internet" protocol=icmp
add action=accept chain=input comment="VPN l2tp and pptp ports" dst-port=1723 protocol=tcp
add action=accept chain=input protocol=gre
add action=accept chain=input dst-port=1701 protocol=udp
add action=accept chain=input protocol=ipsec-esp
add action=accept chain=input protocol=ipsec-ah
add action=accept chain=input dst-port=50,500,4500 protocol=udp
add action=accept chain=input comment="OpenVPN port" dst-port=1194 protocol=tcp
add action=accept chain=input comment=WireGuard dst-port=13231 protocol=udp
add action=accept chain=input comment="Allow SSH" dst-port=22 protocol=tcp src-address-list=allow_ssh
add action=add-src-to-address-list address-list=port_8000 address-list-timeout=1m chain=input comment=\
"Port knocking" dst-port=8000 protocol=tcp
add action=add-src-to-address-list address-list=allow_ssh address-list-timeout=1d chain=input dst-port=3000 \
protocol=tcp src-address-list=port_8000
add action=accept chain=input comment="Allow FTP from inside" dst-port=21 in-interface=!ether1 protocol=tcp
add action=add-src-to-address-list address-list=wake_server address-list-timeout=55s chain=input comment=\
"WOL trigger" dst-port=999 protocol=tcp
add action=drop chain=forward comment="drop not dstnat'ed forward" connection-nat-state=!dstnat disabled=yes \
in-interface=ether1
/ip firewall nat
add action=masquerade chain=srcnat
Interfaces
/interface bridge
add arp=proxy-arp name=bridge1
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface list
add comment="internal interfaces" name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/interface bridge port
add bridge=bridge1 comment="room plugs" ingress-filtering=no interface=ether2
add bridge=bridge1 ingress-filtering=no interface=ether3
add bridge=bridge1 comment=server ingress-filtering=no interface=ether4
add bridge=bridge1 comment=service ingress-filtering=no interface=ether5
add bridge=bridge1 comment=wifi ingress-filtering=no interface=ether10
/interface l2tp-server server
set default-profile=*1 use-ipsec=yes
/interface list member
add interface=bridge1 list=LAN
/interface wireguard peers
add allowed-address=10.10.0.2/24 interface=wireguard1 public-key=\
"KEY="
So I cannot make requests Win Client → 192.168.188.2. Any thoughts?