There it is. I just tried it without Allowed Address and with 0.0.0.0/0 because I just wanted to see something happen. The local Gateway is behind tripple NAT so the IP is Wurscht.
Well lets start with basics.
As far as I can tell you only have one device involved, so either you are creating a tunnel to a higher intelligent alien civilization, or we are missing critical information.
Seriously, there are two likely possibilities.
a. there is a Device 2 - location, relationship, config ??
OR
b Third party VPN Vendor ??
Like i said, this is my cloud router, the rb3011 is behind tripple nat and has the cloud router as endpoint. i can give the cloud router xyz.notexist as endpoint but for what?
You have posted an export of just one peer, what’s the second one, another CHR or something completely different?
Second, did you try to ping via the tunnel? Wireguard doesn’t initiate the session until it gets a payload packet to transport or unless you set persistent-keepalive at the /interface/wireguard/peers row to something else than 0.
the second peer is a rb3011 behind tripple nat, yes i didnt post the config.
I didnt know that payload is needed, so there is no handshake and no loggign before theres no try, ok i just thought there will be some logging and connection initialization
Client Device RB3011 (for initial connection due to being behind tripple NAT)
What do you wish to accomplish?
A. Have a CHR subnet go out RB3011 internet thru the wireguard tunnel?
B. Want be able to configure the CHR from the RB3011 admin PC, thru the wireguard tunnel ?
C. etc…
EDIT:
Okay I see you have no user requirements at the moment, just playing with settings.
Facepalm…i forgot to add an IP for the wireguard interfaces.
But at last…I try to explain what i have to do with my bad english.
Location A: Has 2 WAN, DSL and LTE and offers some webservices for the coworkers. If the DSL goes Down and the LTE goes online the services aren’t available from outside because of Double Nat inside the LTE Network. So i want to Route this through an “always-on-gateway” AKA Azure Cloud Instance AKA LocationB:
So locA has an wguard tunnel to locb and the coworkers ask locb b’s ip/dns which reconnects them through vpn to locA.
So my Tunnel actually goes up after i added ip’s to the interfaces, routing and firewall are set up.
To be honest I have successfully configured, with Sindy’s astute and accurate help, my ‘live’ wireguard connections without an IP address attached to the wireguard interfaces. I have not found yet, a compelling reason to do so.
With the proper WIREGUARD settings themselves, I have found, thus far, that I can direct traffic flow with appropriate IP Routes and FW Rules (both input and forward chain). Another useful functionality is provided by the fact that the wireguard interface can be an Interface List Member (but not a bridge member).
So I can understand better.
1- Location A, acts as the client device for initial connection, to Location B, because when the Primary WAN goes down, the Secondary WAN provides a private IP with no method of forwarding a port to your Mikrotik Router.
2 - Location B not understood.
What is the relationship between co-workers and Location B?
Are the co-workers actually more affiliated with Location A, aka they use Location A web servers.
If so, what do they use Location B for?
Assuming this Location B is the CHR of what you speak?
Where is the config for this device?