Hello.
Connecting two sites with Wireguard. This is not the first one. Have done some successfully before. Only difference is, that there is a WAN bridge configured on one side.
Tunnel is up. There is traffic. Can even ping LAN1 devices from Router2 (no interface or IP defined). And backwards LAN2 devices from Router1.
But cant ping from router if src. address is LAN address. Same (no ping) from LAN2 device to LAN1 device and backwards.
Suspect that its related to wan bridge, but cant figure out what.
ROS 7.15.2.
Following configurations with some made up public IPs. Removed non related.
Router1
# model = CCR1009-7G-1C-1S+
/interface bridge add name=bridge-LAN port-cost-mode=short
/interface bridge add name=bridge-WAN port-cost-mode=short
/interface wireguard add listen-port=13231 mtu=1420 name=WG-TEHAS
/interface list add name=LAN
/interface list add name=WAN
/ip ipsec profile add dh-group=modp1024 enc-algorithm=3des name=lasprof
/ip ipsec peer add address=100.100.100.251/32 local-address=200.200.200.115 name=tln profile=lasprof
/ip ipsec proposal set [ find default=yes ] enc-algorithms=3des
/ip ipsec proposal add auth-algorithms=sha256 enc-algorithms=aes-256-cbc name="hw acc proposal"
/ip pool add name=dhcp_pool0 ranges=10.0.0.100-10.0.0.200
/ip dhcp-server add address-pool=dhcp_pool0 interface=bridge-LAN lease-time=1d name=dhcp1
/routing bgp template set default disabled=no output.network=bgp-networks
/routing ospf instance add disabled=no name=default-v2
/interface bridge port add bridge=bridge-WAN ingress-filtering=no interface=combo1 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge-LAN ingress-filtering=no interface=ether4 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge-LAN ingress-filtering=no interface=ether5 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge-LAN ingress-filtering=no interface=ether6 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge-WAN ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge-WAN ingress-filtering=no interface=ether1 internal-path-cost=10 path-cost=10
/ip firewall connection tracking set udp-timeout=10s
/interface list member add interface=bridge-LAN list=LAN
/interface list member add interface=WG-TEHAS list=LAN
/interface list member add interface=bridge-WAN list=WAN
/interface ovpn-server server set auth=sha1,md5
/interface wireguard peers add allowed-address=192.168.19.4/32,192.168.10.0/24 disabled=no interface=WG-TEHAS is-responder=yes name=OFFICE2 persistent-keepalive=25s public-key="xxxxxxxxxxxx"
/ip address add address=200.200.200.114/29 comment="Router IP" interface=bridge-WAN network=200.200.200.112
/ip address add address=200.200.200.115 comment="Office WAN IP" interface=bridge-WAN network=200.200.200.115
/ip address add address=10.0.0.254/24 comment="Office LAN IP" interface=bridge-LAN network=10.0.0.0
/ip address add address=192.168.19.1/24 interface=WG-TEHAS network=192.168.19.0
/ip dhcp-server network add address=10.0.0.0/24 comment=office dns-server=10.0.0.34 gateway=10.0.0.254
/ip dns set allow-remote-requests=yes servers=DNSSERVER
/ip firewall address-list add address=192.168.1.0/24 list=vpn_list
/ip firewall address-list add address=10.0.2.0/24 list=vpn_list
/ip firewall filter add action=accept chain=input dst-port=13231 protocol=udp
/ip firewall filter add action=accept chain=input dst-address=200.200.200.115 dst-port=13231 in-interface=bridge-WAN protocol=udp src-address=201.201.201.166
/ip firewall filter add action=accept chain=input dst-port=500 protocol=udp src-address=100.100.100.251
/ip firewall filter add action=accept chain=input comment=winbox dst-port=8291 protocol=tcp src-address-list=safe_ip
/ip firewall filter add action=accept chain=input comment=ping dst-address=200.200.200.115 protocol=icmp
/ip firewall filter add action=accept chain=input comment="established ja related" connection-state=established,related
/ip firewall filter add action=drop chain=input comment="drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=input comment="drop all input from WAN" in-interface=bridge-WAN
/ip firewall filter add action=accept chain=forward dst-address=10.0.0.0/24 in-interface=bridge-WAN src-address=10.0.2.0/24
/ip firewall filter add action=accept chain=forward dst-address=10.0.0.0/24 src-address=192.168.10.0/24
/ip firewall filter add action=accept chain=forward dst-address=192.168.10.0/24 src-address=10.0.0.0/24
/ip firewall filter add action=accept chain=forward comment="establised ja related" connection-state=established,related
/ip firewall filter add action=drop chain=forward comment="drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="drop all forward not dstnat'ed" connection-nat-state=!dstnat connection-state=new in-interface=bridge-WAN
/ip firewall nat add action=src-nat chain=srcnat comment="Office net masquerade" dst-address-list=!vpn_list out-interface=bridge-WAN src-address=10.0.0.0/24 to-addresses=200.200.200.115
/ip firewall nat add action=accept chain=srcnat comment="VPN" dst-address=10.0.2.0/24 src-address=10.0.0.0/24
/ip firewall nat add action=dst-nat chain=dstnat comment="VPN SSL" dst-address=200.200.200.115 dst-port=443 protocol=tcp to-addresses=10.0.0.35 to-ports=443
/ip ipsec identity add peer=tln
/ip ipsec policy add dst-address=10.0.2.0/24 peer=tln proposal="hw acc proposal" src-address=10.0.0.0/24 tunnel=yes
/ip route add disabled=no dst-address=0.0.0.0/0 gateway=200.200.200.113
/ip route add disabled=no dst-address=192.168.10.0/24 gateway=WG-TEHAS routing-table=main suppress-hw-offload=no
Router2
# model = RB2011UiAS
/interface bridge add admin-mac=D4:CA:6D:0B:9C:88 auto-mac=no comment=defconf name=bridge port-cost-mode=short
/interface wireguard add listen-port=13231 mtu=1420 name=WG-SYS
/interface list add comment=defconf name=WAN
/interface list add comment=defconf name=LAN
/ip pool add name=default-dhcp ranges=192.168.10.100-192.168.10.199
/ip dhcp-server add address-pool=default-dhcp interface=bridge lease-time=12h10m name=defconf
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether3 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether4 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether5 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether6 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether7 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether8 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether9 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=sfp1 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge interface=ether10 internal-path-cost=10 path-cost=10
/ip firewall connection tracking set udp-timeout=10s
/ip neighbor discovery-settings set discover-interface-list=LAN
/ip settings set max-neighbor-entries=8192
/ipv6 settings set disable-ipv6=yes max-neighbor-entries=8192
/interface list member add comment=defconf interface=bridge list=LAN
/interface list member add comment=defconf interface=ether1 list=WAN
/interface list member add interface=WG-SYS list=LAN
/interface wireguard peers add allowed-address=192.168.19.0/24,10.0.0.0/24 endpoint-address=200.200.200.115 endpoint-port=13231 interface=WG-SYS name=tehas persistent-keepalive=25s public-key="xxxxxxxxxxxxx"
/ip address add address=192.168.10.1/24 comment=defconf interface=bridge network=192.168.10.0
/ip address add address=201.201.201.166/29 comment="WAN aadress" interface=ether1 network=201.201.201.160
/ip address add address=192.168.19.4/24 interface=WG-SYS network=192.168.19.0
/ip dhcp-server network add address=192.168.10.0/24 comment=defconf dns-server=192.168.10.1 gateway=192.168.10.1
/ip firewall address-list add address=192.168.19.0/24 list=mylist
/ip firewall address-list add address=10.0.0.0/24 list=mylist
/ip firewall address-list add address=10.0.10.10 list=mylist
/ip firewall filter add action=accept chain=input comment=winbox dst-port=8291 protocol=tcp src-address-list=safe_ip
/ip firewall filter add action=accept chain=input dst-port=13231 protocol=udp
/ip firewall filter add action=accept chain=input comment=Ovpn dst-port=1194 protocol=tcp src-address=110.1.0.0/16
/ip firewall filter add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface=ether1
/ip firewall filter add action=accept chain=forward dst-address=192.168.10.0/24 src-address=10.0.0.0/24
/ip firewall filter add action=accept chain=forward dst-address=10.0.0.0/24 src-address=192.168.10.0/24
/ip firewall filter add action=drop chain=forward comment="drop SMB out" dst-address-list=!safe_ip dst-port=445 out-interface=ether1 protocol=tcp
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" dst-address-list=!vpn_list ipsec-policy=out,none out-interface-list=WAN
/ip route add disabled=no dst-address=0.0.0.0/0 gateway=201.201.201.161
/ip route add disabled=no distance=1 dst-address=10.0.0.0/24 gateway=WG-SYS routing-table=main scope=30 suppress-hw-offload=no target-scope=10
/ppp secret add local-address=192.168.10.1 name=leh remote-address=192.168.10.99 routes=192.168.99.0/24 service=ovpn
