Wireguard vs. Back To Home

Hello,

for my VPN I want to setup a Wireguard server on my RB5009.
Is it still possible to simply add a Wireguard interface manually and setup all the stuff manually (as described on https://help.mikrotik.com/docs/display/ROS/WireGuard) or is it necessary to use Back To Home on newer RouterOS versions (as described on https://help.mikrotik.com/docs/display/ROS/Back+To+Home)?
Is Wireguard part of newer RouterOs versions by default or do I need to install the packet manually?

For my understanding “Back To Home” is only a more user-friendly way of setting-up a Wireguard server, right?

The main reason for asking about Wireguard (instead of Back To Home) is, that I want to fully understand my setup and with Back To Home things like "

Allow-lan=no

will add the users into a firewall address list, that only allows internet access, but blocks the user from accessing your internal network. Note that expiry date can’t be changed, once a user has been added." are a bit “intransparent” what exactly Back To Home configures in the background.

Is there a way for Wireguard (and Back To Home) to generate peer specific QR codes for configuration?
I know that Back To Home shows a single QR code, but without a specific IP address for the peer.
Is it possible to generate peer specific QR codes from within RouterOS?

Thanks a lot for clarification in advance,

Thomas

Back To Home uses Wireguard, but does more things. It also can work between two devices that don’t have a public IP, using our Relay service and using Hole Punching.
Yes, it has convenience features, that automatically manage firewall access, like you observed.

Is there a way for Wireguard (and Back To Home) to generate peer specific QR codes for configuration?

yes to both.

Back to home also has peer specific QR codes, you access them in the users panel. IP → Cloud → Back to Home users → click to open, see “Config” section