Hi all
because I spent lots of time to solve my problem, and no succes I am asking for help in MK community.
We have two office branch which is interconnectd by IPsec S2S (tunneled) connection, this works well. I am able ping from any host fom Office1 to any other host in Office2. (10.10.10.12 <----> 192.168.100.10)
Also we have some people on HomeOffices which are (will be) connected as wireguard client (10.10.30.2). Wireguard server (10.10.30.1) works on Mikrotik (10.10.10.1) installed in Office1.
I sef lots of combination of ip firewall filter and NATs, but I am able ping only from WG client (10.10.30.2) to network 10.10.10.x .
No ping from this WG client to Office2 (192.168.100.x).
May you somebody help me ?
MK Office1 config
/ip firewall filter add action=accept chain=input in-interface=vpn-wg log=yes
/ip firewall filter add action=accept chain=output out-interface=vpn-wg
/ip firewall filter add action=accept chain=forward in-interface=vpn-wg
/ip firewall filter add action=accept chain=forward out-interface=vpn-wg
/ip firewall filter add action=accept chain=forward connection-state=established,related dst-address=10.10.10.0/24
/ip firewall filter add action=accept chain=forward src-address=10.10.10.0/24
/ip firewall filter add action=accept chain=input dst-port=53 protocol=udp src-address=10.10.10.0/24
/ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=es
tablished,related,untracked
/ip firewall filter add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
/ip firewall filter add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
/ip firewall filter add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,r
elated hw-offload=yes
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state
=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dst
nat connection-state=new in-interface-list=WAN
/ip firewall filter add action=drop chain=forward
/ip firewall nat add action=masquerade chain=srcnat dst-address=192.168.100.1 log=yes log-prefix=nat:: src-address=10.10.30.1
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
[admin@mk] > ip route/print
Flags: D - DYNAMIC; A - ACTIVE; c, s, y - COPY
Columns: DST-ADDRESS, GATEWAY, DISTANCE
# DST-ADDRESS GATEWAY DISTANCE
0 As 0.0.0.0/0 xx.xx.xx.xx 1
DAc 10.10.10.0/24 bridge 0
DAc 10.10.30.0/24 rsys-vpn-wg 0
DAc xx.xx.xx.xx ether1 0
1 As 192.168.1.0/24 bridge 1
2 As 192.168.100.0/24 rsys-vpn-wg 2
MK Office 2 config
/ip firewall filter add action=accept chain=forward dst-address=192.168.100.0/24 log=yes src-address=10.10.10.0/24
/ip firewall filter add action=accept chain=forward src-address=10.10.30.0/24
/ip firewall filter add action=accept chain=input dst-port=1194 protocol=tcp
/ip firewall filter add action=drop chain=input dst-port=53 in-interface=ether1 protocol=tcp
/ip firewall filter add action=drop chain=input dst-port=53 in-interface=ether1 protocol=udp
/ip firewall filter add action=drop chain=forward dst-port=2000 in-interface=ether1 protocol=tcp
/ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
/ip firewall filter add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
/ip firewall filter add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat add action=accept chain=srcnat dst-address=192.168.1.0/24 src-address=192.168.100.0/24 to-addresses=10.10.10.1
/ip firewall nat add action=accept chain=dstnat dst-address=192.168.100.0/24 src-address=10.10.30.0/24 to-addresses=10.10.10.1
/ip firewall nat add action=log chain=dstnat in-interface=bridge src-address=10.10.30.0/24
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
[admin@MikroTik-01] > ip route print
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 xx.xx.xx.xx 1
1 X S 10.10.10.0/24 bridge 1
2 A S 10.10.30.0/24 192.168.100.1 bridge 1
3 X S 10.10.100.0/22 bridge 1
4 ADC 172.20.1.0/24 172.20.1.1 bridge 0
5 ADC xx.xx.xx.xx/20 xx.xx.xx.xx ether1 0
6 A S 192.168.1.0/24 192.168.100.1 bridge 1
7 ADC 192.168.100.0/24 192.168.100.1 bridge 0
c:\>tracert 10.10.10.12
Tracing route to NPI25AD57 [10.10.10.12]
over a maximum of 30 hops:
1 13 ms 15 ms 15 ms 10.10.30.1
2 13 ms 13 ms 13 ms NPI25AD57 [10.10.10.12]
Trace complete.
c:\>tracert 192.168.100.10
Tracing route to SERVER01 [192.168.100.10]
over a maximum of 30 hops:
1 15 ms 15 ms 13 ms 10.10.30.1
2 * * * Request timed out.
3 *

