WireGuard configuration - not working... help

Hello everyone…
im new with configuration and work with Mikrotik routers so i need help and advice about how to configure WireGuard VPN, how to open ports, config firewall and nat.
i know that is a lot. i watched few youtoube videos how to configure wireguard so i did some config.
Dont have picture of my network but it is like this.
I have LAN with few subnets 192.168.2.0/24, 192.168.9.0/24 i have everying conneced to proxy on ip 192.168.9.7 on internet over public ip address.
I put ip adres of mikrotik router 192.168.2.50/24.
This mikrotik shoud be my VPN connecion on the same network from second public ip address.
My second public ip adress is 193.X.X.X
I open WG interface with ip 192.168.3.2/24.
When i try to make connecion over laptop to wg interface i dont get any handshake and cant ping anything. Cant iven ping wg interface… so i know that something is wrong.
Error is Handshake for peer ( 193.X.X.X:13231 ) did not complete. sending handshake to peer…and all over again
I open two wg peers… one shoud be for administrator, for me and i should see everything on LAN(from outside) inside my network( i connecting on users computers over VNC port 5900, connection on servers over RDC ), second peer shoud be just for connecting VPN users on server over RDC.

Can someone help me make VPN

Thank you

Here is my config:

1970-01-24 02:49:55 by RouterOS 7.11.2
# software id = 1JGC-1QJD
#
# model = RB750Gr2
# serial number = <edit>
/interface bridge
add admin-mac=E4:8D:8C:A6:56:39 auto-mac=no comment=defconf name=bridge1
/interface ethernet
set [ find default-name=ether1 ] name=ether1-public
set [ find default-name=ether2 ] name=ether2-LAN
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/interface bridge port
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=ether1-public list=WAN
add comment="Interface WireGuard" interface=wireguard1 list=WAN
add interface=ether2-LAN list=LAN
add interface=bridge1 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
/interface wireguard peers
add allowed-address=192.168.3.3/32 comment=Administrator interface=wireguard1 public-key="VG+vCypHno4JlatypvEpmcLT8kqRr4tXLtulNvc4mWQ="
add allowed-address=192.168.3.4/32 comment=Users interface=wireguard1 public-key="sBEIoogu20ZtUZBoI5Pi0TB9AQGQdhUXoHonNB0PYR4="
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge1 network=192.168.88.0
add address=192.168.2.50/24 comment=LAN interface=ether2-LAN network=192.168.2.0
add address=193.198.101.106/29 comment=PUBLIC interface=ether1-public network=193.X.X.X
add address=192.168.3.2/24 interface=wireguard1 network=192.168.3.0
/ip dhcp-client
add comment=defconf interface=ether1-public
/ip dhcp-server
add address-pool=*1 interface=bridge1 lease-time=10m name=defconf
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=accept chain=input comment="ICMP allowed" protocol=icmp
add action=accept chain=input comment="Allow WireGuard" dst-address-list="" dst-port=13231 protocol=udp
add action=accept chain=forward in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="to allow remote users to acces 192.168.2.0/24 local subnet" dst-address=192.168.2.0/24 in-interface=wireguard1
add action=accept chain=forward comment="to allow remote users to acces 192.168.9.0/24 local subnet" dst-address=192.168.9.0/24 in-interface=wireguard1
add action=accept chain=input comment="Allow WireGuard trafic" src-address=192.168.3.0/24
add action=accept chain=forward comment="to allow local subnet 192.168.2.0/24 to enter WireGuard interface" out-interface=wireguard1 src-address=192.168.2.0/24
add action=accept chain=forward comment="to allow local subnet 192.168.9.0/24 to enter WireGuard interface" out-interface=wireguard1 src-address=192.168.9.0/24
add action=accept chain=forward comment="Allow 192.168.3.2/24 to administrate router  remotly" dst-port=8291 in-interface=wireguard1 protocol=tcp src-address=192.168.3.2
add action=accept chain=forward comment="Accept out ipsec policy" ipsec-policy=out,ipsec
add action=accept chain=forward comment="Accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=input comment="Allow Mikrotik port" dst-port=51820 protocol=udp
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1-public
/ip route
add disabled=no distance=1 dst-address=192.168.9.0/24 gateway=ether2-LAN pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add disabled=no dst-address=192.168.10.0/24 gateway=ether2-LAN routing-table=main suppress-hw-offload=no
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/system identity
set name=OBNG-VPN
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

You may want to start reading this excellent post from anav (heavy to digest at first, I admit, but read it a couple of times)
https://forum.mikrotik.com/viewtopic.php?t=182340

I read it but i think i didnt make good firewall ruls and nat.
When i connect i see on interface Rx packets but not Tx
so i think i didnt make good port fowarding or something on firewall i dont see it so i need help guys…
Because of that i thin i cant get handshake betweek wireguard VPN and laptop

Help please

I followed you until you used the word proxy which is like sayng xllcinnoinoinkltjeodcoc to me.

Do you or do you not have a public IP address on WAN side?
Do you have two ISPs, two wan connections?
Does your MT act as the WG server for initial handshake or are you connecting to an external WG instance?
What is the purpose of your WG connections..

Draw a diagram as your explanation is too confusing. We are not inside your head nor familiar with the network.
“This mikrotik shoud be my VPN connecion on the same network from second public ip address.” ???

To make a picture…
NETWORK DIAGRAM APPS:
https://nulab.com/cacoo/
https://online.visual-paradigm.com/diagrams/solutions/free-network-diagram-software/
https://www.lucidchart.com/pages/
https://drawio-app.com/product/
https://www.diagrams.net/ (its older sibling soon to be discontinued https://drawio-app.com/product/)
( Other links for diagrams.net - https://www.youtube.com/watch?v=P3ieXjI7ZSk & https://www.youtube.com/watch?v=mpF1i9sfEJ0 )
https://sourceforge.net/projects/dia-installer/
https://www.yworks.com/products/yed (and icons for yed → https://github.com/danger89/yEd_cisco_network_icons )
https://www.libreoffice.org/discover/draw/

http://kilievich.com/fpinger/ - has a simple drawing program but not its main intent.


In terms of requirement you need to explain without any config talk or network talk,
a. identify the user(s)/device(s) or groups of users/devices that will be using the MT
b. identify the traffic flows they require including the admin.

I knew the Master of Wireguard was going to step in :laughing:

Naw, just more patience than most… but folks should really avoid posting anything with the word capsman or proxy if they want my help :wink:

First i wil answer ANAV to your questions…

  1. yes i have public adress for WAN port 193.x.x.x
  2. yes i have posibility for 6 wan connection ( 6 public ip address ). for company we are using 1 at the time for internet, mail…
  3. in config i send to you of MT i made virtual interface WireGuard with 2 peer on MT ( one or me administatior and second is for user)… i was hoping that i made server and i put on WG interface ip address 192.168.3.2/24. I tought that was config for WG server.
    My purpose of VPN is to manage ( im IT administrator) to do some work from home and not ot use TeamViewer or Anydesk, and for my users who need to do some analitics on servers i wonna make better way to do jobs..

skip my explenation for proxy and my network who si working very good now and im sorry if i jdksghsdjkhsdjkfhsdjk do you :wink:

lets do MT config
i hope picture will show to what i wonna to do with MT and VPN

Thank you very much
network.jpg

Okay so to be clear.

a. Primary router is not MT and your subnet behind that consists of a bunch of PCs and a MT device acting as a router (its LANIP on the ISP router is the WANIP of the MT device as well).
b. The purpose of installing the router there is to gain access to the ISP router for config purposes? To gain access to the PCs behind the ISP router?
c. what I dont understand is why you dont put the second IP on the ISP router as well and then simply forward the listening port to the MT router. It just seems weird to me to have a second ISP going to the separate MT device solely for the purpose of establishing a tunnel and not providing some benefit to the main network??

IN other words something doesnt seem right in this setup?
Why not replace ISP router with MT router ??

  1. Primary router is CISCO given us by ISP from higher lvl our company
  2. im sistem administrator and i wonna get access to my network from outside…for configuration, for helping users, all job i do at work… but im only one administrator i our company so i do work from home too.
    i install MT router because im sick do paying licence to adydesk or teamviewer…they are go expencive… and compay dont wonna pay it… so im thinking to get solution for free if i have MT router who is in this point dont connected to anywhere…for my purpuse and purpuse few users for VPN should be fine..i think… so VPN purpose is to me gain acess to all network behind MT router, to our servers, pcs, switches… all other devices
  3. i think that CISCO router (old cca 10 years ) dont have what it takes to make VPN. I should install some kind of VPN aplication or VPN server of server or somethnig like that if i wonna make port fowarding to him. I think simple solution is MT.

Every port on cisco where i have those 6 public ip addrees have very good speed and they dont interact with eath other. so i tought VPN over MT shoud be good… if i manage to confingure that
I can have benifits from second router but problem is that all Internet is going over optics and over one ISP so.-… if the break cables or make some mess… we lose all 6 public ip address. if we cound buy second saparate ISP then i cound route all my network from one isp to another if i have some problems with first ISP. Like i said … my company doesnt wont that.

so my idea was making VPN from second router MT to my newtork if is posibble

Thank you

Well, it should be possible so this is an interesting scenario!!

One issue I see off the bat, is
→ even though we can WIREGUARD easily into the mikrotik router and ATTEMPT to access the various subnets on the CISCO, success will certainly depend on your ability to
configure the Cisco for firewall rules.

There will be no way for remote users to access all the subents unless the cisco allows that access??
So how much control do you have to allow such traffic!!

Can you also do static routes on the cisco…

i can do static routes on Cisco…
With MT configuration i made and routes i can connect and ping MT from anywhere…
problem is i dont know did i make wg server good… i dont know how to port fowarding… 13231 to wg server… this is for start.. after i connect and vpn start working we can do problems one by one…
thx Anav for time spending on me

Okay lets setup the MT as router.
Subnet 192.168.40.0/24 ( just to have a subnet behind the router that is unique in case you need one )

Lets setup wireguard as subnet 10.10.40.0/24

MT router has either two WANS
Ether1 to ISP2 as you indicated was available.
Ether2 to CISCO router and the MT’s WANIP is also its statically assigned LANIP on the CIsco subnet 192.168.2.X

OR (what we will try)

MT router has one WAN
Ether1 to ISP2 as you indicated was available.
Ether2 is a port and possibly a vlan, basically assign the static IP address to the interface.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

serial number =

/interface bridge
add admin-mac=E4:8D:8C:A6:56:39 auto-mac=no comment=defconf name=bridge1
/interface ethernet
set [ find default-name=ether1 ] name=ether1-public
set [ find default-name=ether2 ] name=ether2-crisco-LAN
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface bridge port
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=ether1-public list=WAN
add comment=“Interface WireGuard” interface=wireguard1 list=WAN
add interface=ether2-crisco-LAN list=LAN
add interface=bridge1 list=LAN
/interface wireguard peers
add allowed-address=10.10.10.3/32 comment=Administrator interface=wireguard1 public-key=“VG+vCypHno4JlatypvEpmcLT8kqRr4tXLtulNvc4mWQ=”
add allowed-address=10.10.10.4/32 comment=Users interface=wireguard1 public-key=“sBEIoogu20ZtUZBoI5Pi0TB9AQGQdhUXoHonNB0PYR4=”
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge1 network=192.168.88.0
add address=192.168.2.50/24 comment=LAN interface=ether2-crisco-LAN network=192.168.2.0
add address=193.198.101.106/29 comment=PUBLIC interface=ether1-public network=193.X.X.X
add address=10.10.10.1/24 interface=wireguard1 network=10.10.10.0
/ip dhcp-client
add comment=defconf interface=ether1-public { assuming you have default route selected here ?? }
/ip dhcp-server
add address-pool=*1 interface=bridge1 lease-time=10m name=defconf
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1
/ip firewall address-list
add address=10.10.10.2/32 list=Authorized comment=RemoteAdmin
add address=192.168.88.88 list=Authorized comment=“Local wired admin static LANIP lease”
add address=192.168.2.XX list=Authorized comment=“Admin on Crisco Wired static LANIP lease”
etc.. ( as many ways as the admin needs to access the MT router )
/ip firewall filter
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=input comment=“defconf: accept to local loopback (for CAPsMAN)” dst-address=127.0.0.1
add action=accept chain=input comment=“Allow WireGuard” dst-address-list=“” dst-port=13231 protocol=udp
add action=accept chain=input in-interface-list=Authorized
add action=accept chain=input in-interface-list=LAN dst-port=53 protocol=udp
add action=accept chain=input in-interface-list=LAN dst-port=53 protocol=tcp
add action=drop chain=input comment="drop all else
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=forward comment=“allow internet traffic” in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward in-interface=wireguard1 out-interface=ether2-crisco-LAN comment=“permit wg traffic to go out ether2-crisco”
add action=drop chain=forward comment=“drop all else”
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1-public
add action=masquerade chain=srcnat out-interface=ether2-crisco-LAN
/ip route
add dst-address=192.168.0.0/20 gateway=192.168.2.1 routing-table=main
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/ipv6 firewall filter
add action=drop chain=input
add action=drop chain=forward
/tool mac-server
set allowed-interface-list=NONE
/tool mac-server mac-winbox
set allowed-interface-list=LAN

================================\

Note 1: I changed wireguard subnet to be distinct from all other subnets for clarity and to be able to make routes easier (see note 2).

Note 2: I described the route to ALL the subnets on the crisco, one one line as 192.168.0.0/20 covers 192.168.0.1-192.168.15.254 ( and thus the wireguard subnet was moved NOT to fall into this convenient rule.

Note 3: There is an issue on IP route for the actual ISP connection on the mT. You have an IP address for the ISP but you also have IP DHCP client enabled, its one or the other.

Anav it doesnt work
on laptop im still getting error and problemn with handskahe… i restart mt and it’s still the same
handshake for peer 1 (193.x.x.x:13231) did not complete after 5 sec
sending handshake initiation to peer 1

and again same error problem stih handshake
Should i port fowarding WAN public ip adress to WG server or this MT do automaticly when WAN port see some trafic on 13231 port?


what do i do wrong?

How would I know if you dont post your config ??

/export file=anynameyouwish (minus router serial number, any public WANIP information, keys etc..)

1970-01-31 00:22:03 by RouterOS 7.11.2

software id = 1JGC-1QJD

model = RB750Gr2

serial number = 5C13057BCC3F

/interface bridge
add admin-mac=E4:8D:8C:A6:56:39 auto-mac=no comment=defconf name=bridge1
/interface ethernet
set [ find default-name=ether1 ] name=ether1-public
set [ find default-name=ether2 ] name=ether2-LAN
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/interface bridge port
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=ether1-public list=WAN
add comment=“Interface WireGuard” interface=wireguard1 list=WAN
add interface=ether2-LAN list=LAN
add interface=bridge1 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
/interface wireguard peers
add allowed-address=10.10.10.2/32 comment=“VPN Admin” interface=wireguard1 public-key=“pIXQyrFcUQy5VRI1B1B986+tWksiLDvqydC2qXCkX2s=”
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge1 network=192.168.88.0
add address=192.168.2.50/24 comment=LAN interface=ether2-LAN network=192.168.2.0
add address=193.198.101.106/29 comment=PUBLIC interface=ether1-public network=193.198.101.104
add address=10.10.10.1/24 interface=wireguard1 network=10.10.10.0
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=accept chain=input comment=“ICMP allowed” protocol=icmp
add action=accept chain=input comment=“Allow WireGuard” dst-address-list=“” dst-port=13231 protocol=udp
add action=accept chain=input dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input dst-port=53 in-interface-list=LAN protocol=tcp
add action=accept chain=forward comment=“permit wg traffic to go out ether2-LAN” in-interface=wireguard1 out-interface=ether2-LAN
add action=accept chain=forward comment=“allow internet traffic” in-interface-list=LAN out-interface-list=WAN
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related hw-offload=yes
add action=accept chain=input comment=“defconf: accept to local loopback (for CAPsMAN)” dst-address=127.0.0.1
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1-public
add action=masquerade chain=srcnat out-interface=ether2-LAN
/ip route
add disabled=no distance=1 dst-address=192.168.9.0/24 gateway=ether2-LAN pref-src=“” routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add disabled=no dst-address=192.168.10.0/24 gateway=ether2-LAN routing-table=main suppress-hw-offload=no
add disabled=no dst-address=192.168.1.0/24 gateway=ether2-LAN routing-table=main suppress-hw-offload=no
/ipv6 firewall address-list
add address=::/128 comment=“defconf: unspecified address” list=bad_ipv6
add address=::1/128 comment=“defconf: lo” list=bad_ipv6
add address=fec0::/10 comment=“defconf: site-local” list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment=“defconf: ipv4-mapped” list=bad_ipv6
add address=::/96 comment=“defconf: ipv4 compat” list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment=“defconf: documentation” list=bad_ipv6
add address=2001:10::/28 comment=“defconf: ORCHID” list=bad_ipv6
add address=3ffe::/16 comment=“defconf: 6bone” list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMPv6” protocol=icmpv6
add action=accept chain=input comment=“defconf: accept UDP traceroute” port=33434-33534 protocol=udp
add action=accept chain=input comment=“defconf: accept DHCPv6-Client prefix delegation.” dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment=“defconf: accept IKE” dst-port=500,4500 protocol=udp
add action=accept chain=input comment=“defconf: accept ipsec AH” protocol=ipsec-ah
add action=accept chain=input comment=“defconf: accept ipsec ESP” protocol=ipsec-esp
add action=accept chain=input comment=“defconf: accept all that matches ipsec policy” ipsec-policy=in,ipsec
add action=drop chain=input comment=“defconf: drop everything else not coming from LAN” in-interface-list=!LAN
add action=accept chain=forward comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=drop chain=forward comment=“defconf: drop packets with bad src ipv6” src-address-list=bad_ipv6
add action=drop chain=forward comment=“defconf: drop packets with bad dst ipv6” dst-address-list=bad_ipv6
add action=drop chain=forward comment=“defconf: rfc4890 drop hop-limit=1” hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment=“defconf: accept ICMPv6” protocol=icmpv6
add action=accept chain=forward comment=“defconf: accept HIP” protocol=139
add action=accept chain=forward comment=“defconf: accept IKE” dst-port=500,4500 protocol=udp
add action=accept chain=forward comment=“defconf: accept ipsec AH” protocol=ipsec-ah
add action=accept chain=forward comment=“defconf: accept ipsec ESP” protocol=ipsec-esp
add action=accept chain=forward comment=“defconf: accept all that matches ipsec policy” ipsec-policy=in,ipsec
add action=drop chain=forward comment=“defconf: drop everything else not coming from LAN” in-interface-list=!LAN
/system identity
set name=OBNG-VPN
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

sorry Anav.. here is config updated

here is log from laptop:
2023-11-02 10:47:15.464: [TUN] [wg0] Starting WireGuard/0.5.3 (Windows 10.0.19045; amd64)
2023-11-02 10:47:15.465: [TUN] [wg0] Watching network interfaces
2023-11-02 10:47:15.467: [TUN] [wg0] Resolving DNS names
2023-11-02 10:47:15.467: [TUN] [wg0] Creating network adapter
2023-11-02 10:47:15.713: [TUN] [wg0] Using existing driver 0.10
2023-11-02 10:47:15.730: [TUN] [wg0] Creating adapter
2023-11-02 10:47:15.963: [TUN] [wg0] Using WireGuardNT/0.10
2023-11-02 10:47:15.963: [TUN] [wg0] Enabling firewall rules
2023-11-02 10:47:15.911: [TUN] [wg0] Interface created
2023-11-02 10:47:15.966: [TUN] [wg0] Dropping privileges
2023-11-02 10:47:15.967: [TUN] [wg0] Setting interface configuration
2023-11-02 10:47:15.967: [TUN] [wg0] Peer 1 created
2023-11-02 10:47:15.973: [TUN] [wg0] Monitoring MTU of default v4 routes
2023-11-02 10:47:15.974: [TUN] [wg0] Setting device v4 addresses
2023-11-02 10:47:15.968: [TUN] [wg0] Sending keepalive packet to peer 1 (193.198.101.106:13231)
2023-11-02 10:47:15.969: [TUN] [wg0] Sending handshake initiation to peer 1 (193.198.101.106:13231)
2023-11-02 10:47:15.973: [TUN] [wg0] Interface up
2023-11-02 10:47:16.038: [TUN] [wg0] Monitoring MTU of default v6 routes
2023-11-02 10:47:16.038: [TUN] [wg0] Setting device v6 addresses
2023-11-02 10:47:16.053: [TUN] [wg0] Startup complete
2023-11-02 10:47:16.059: [MGR] Failed to connect to adapter interface \?\SWD#WireGuard#{C4587890-E226-ADE1-D9E3-959B985C19ED}#{cac88484-7515-4c03-82e6-71a87abac361}: The system cannot find the file specified. (Code 0x00000002)
2023-11-02 10:47:21.116: [TUN] [wg0] Handshake for peer 1 (193.198.101.106:13231) did not complete after 5 seconds, retrying (try 2)
2023-11-02 10:47:21.116: [TUN] [wg0] Sending handshake initiation to peer 1 (193.198.101.106:13231)
2023-11-02 10:47:26.194: [TUN] [wg0] Handshake for peer 1 (193.198.101.106:13231) did not complete after 5 seconds, retrying (try 3)
2023-11-02 10:47:26.194: [TUN] [wg0] Sending handshake initiation to peer 1 (193.198.101.106:13231)
2023-11-02 10:47:31.199: [TUN] [wg0] Shutting down
2023-11-02 10:47:31.208: [MGR] [wg0] Tunnel service tracker finished



Thank you very much

(1) You can remove from interface list as they are covered by the fact you have the bridge listed as LAN interface.
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN

(2) Since this is a wireguard server for incoming folks,
Suggest you change this to LAN
add comment=“Interface WireGuard” interface=wireguard1 list=WAN

It will have more utility in firewall rules!

(3) Your firewall rules are not grouped together which makes them harder to read and see where issues may be…!!!
They are also on the sparse side… suggest.

/ip firewall filter
{Input Chain}
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=input comment=“defconf: accept to local loopback (for CAPsMAN)” dst-address=127.0.0.1
add action=accept chain=input comment=“Allow WireGuard” dst-port=13231 protocol=udp
add action=accept chain=input in-interface-list=LAN
add action=drop chain=input comment=“drop all else”
{forward chain}
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=forward comment=“allow internet traffic” in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment=“allow wireguard to LAN” in-interface=wireguard1 out-interface-list=LAN
add action=accept chain=forward comment=“allow port forwarding” connection-nat-state=dstnat
add action=drop chain=forward comment=“drop all else”

The only thing I would consider doing differently from the above is limit who can configure the router.
Right now all the LAN can access the router services including configuration. In reality only the admin needs full access so we can accomplish that with the following
/ip firewall address-list ( using statically set leases )
add address=192.168.88.X list**=Authorized** comment=“admin desktop”
add address=192.168.88.Y list=Authorized comment=“admin laptop wired”
add address=192.168.88.Z list=Authorized comment=“admin ipad/smartphone wifi”
add address=10.10.10.2/32 list=Authorized comment=“remote admin wg IP”
etc…

Then change
add action=accept chain=input in-interface-list=LAN TO:

add action=accept chain=input src-address-list=Authorized comment=“Config Access”
add action=accept chain=input comment=“Allow LAN DNS” dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input comment=“Allow LAN DNS” dst-port=53 in-interface-list=LAN protocol=tcp

I did all what u suggested. Nope dont work

Post your latest config please…

be ware of this

https://torrentfreak.com/russia-blocks-167-vpns-steps-up-openvpn-wireguard-disruption-231031/