Hallo.
I’m not advanced user. I just try to learn and for now “play” with some stuffs of mt…
I have problem with installation of wireguard between mt and windows client. From windows i can ping mt wg interface but not inside lan ips.
I use the same config to another mt (in other place) and it works. The only differnce is the ros version. The one is on 7.12 and the sencond 7.13 in which i have the problem.
I have two wan (different isp) with load balance and failover. All seems to work well except the wg.
I want to mention that i use backup and restore configuration between two mt and only change wireguard config (peers) as all the other config is the same. Of course the two mt is the same, rb750gr3.
After that i update it to last version 7.13.
My configuration is:
2023-12-23 20:12:22 by RouterOS 7.13
software id = C4BI-DANT
model = RB750Gr3
serial number = XXXXXXXXX
/interface bridge
add name=LAN port-cost-mode=short
/interface ethernet
set [ find default-name=ether1 ] mac-address=xxxxxxxx name=WAN1
set [ find default-name=ether2 ] mac-address=xxxxxxxx name=WAN2
set [ find default-name=ether3 ] mac-address=xxxxxxxx
set [ find default-name=ether4 ] mac-address=xxxxxxxx
set [ find default-name=ether5 ] mac-address=xxxxxxxx
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface list
add name=WG
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/ip pool
add name=dhcp_pool0 ranges=192.168.0.100-192.168.0.190
/ip dhcp-server
add address-pool=dhcp_pool0 interface=LAN name=dhcp1
/port
set 0 name=serial0
/routing table
add fib name=to_WAN1
add fib name=to_WAN2
/interface bridge port
add bridge=LAN ingress-filtering=no interface=ether3 internal-path-cost=10
path-cost=10
add bridge=LAN ingress-filtering=no interface=ether4 internal-path-cost=10
path-cost=10
add bridge=LAN ingress-filtering=no interface=ether5 internal-path-cost=10
path-cost=10
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface ovpn-server server
set auth=sha1,md5
/interface wireguard peers
add allowed-address=192.168.70.3/32 interface=wireguard1 public-key=
“XXXXXXXXXXXXXXXXX”
add allowed-address=192.168.70.4/32 interface=wireguard1 public-key=
“XXXXXXXXXXXXXXXXX”
/ip address
add address=192.168.1.250/24 interface=WAN1 network=192.168.1.0
add address=192.168.2.250/24 interface=WAN2 network=192.168.2.0
add address=192.168.0.1/24 interface=LAN network=192.168.0.0
add address=192.168.70.1/24 interface=wireguard1 network=192.168.70.0
/ip cloud
set ddns-enabled=yes ddns-update-interval=5m
/ip dhcp-server lease
add address=192.168.0.192 client-id=xxxxxxxx mac-address=
xxxxxxxx server=dhcp1
/ip dhcp-server network
add address=192.168.0.0/24 gateway=192.168.0.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1
/ip firewall mangle
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.3
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.10
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.77
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.78
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.79
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.80
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.140
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.192
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.193
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.248
add action=mark-routing chain=prerouting in-interface=LAN new-routing-mark=
to_WAN1 passthrough=no src-address=192.168.0.249
add action=mark-connection chain=input in-interface=WAN1 new-connection-mark=
WAN1_conn passthrough=yes
add action=mark-connection chain=input in-interface=WAN2 new-connection-mark=
WAN2_conn passthrough=yes
add action=mark-routing chain=output connection-mark=WAN1_conn
new-routing-mark=to_WAN1 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN2_conn
new-routing-mark=to_WAN2 passthrough=yes
add action=accept chain=prerouting dst-address=192.168.1.0/24 in-interface=
LAN
add action=accept chain=prerouting dst-address=192.168.2.0/24 in-interface=
LAN
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=LAN new-connection-mark=WAN1_conn passthrough=yes
per-connection-classifier=both-addresses-and-ports:2/0
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=LAN new-connection-mark=WAN2_conn passthrough=yes
per-connection-classifier=both-addresses-and-ports:2/1
add action=mark-routing chain=prerouting connection-mark=WAN1_conn
in-interface=LAN new-routing-mark=to_WAN1 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN2_conn
in-interface=LAN new-routing-mark=to_WAN2 passthrough=yes
/ip firewall nat
add action=masquerade chain=srcnat out-interface=WAN1
add action=masquerade chain=srcnat out-interface=WAN2
add action=dst-nat chain=dstnat comment=VPN dst-port=xxxxxxxx protocol=udp
to-addresses=192.168.70.1 to-ports=xxxxxxxx
add action=dst-nat chain=dstnat comment=192.168.0.77 dst-port=xxxxxxxx protocol=
tcp to-addresses=192.168.0.77 to-ports=xxxxxxxx
add action=dst-nat chain=dstnat comment=192.168.0.78 dst-port=xxxxxxxx protocol=
tcp to-addresses=192.168.0.78 to-ports=xxxxxxxx
add action=dst-nat chain=dstnat comment=192.168.0.79 dst-port=xxxxxxxx protocol=
tcp to-addresses=192.168.0.79 to-ports=xxxxxxxx
add action=dst-nat chain=dstnat comment=192.168.0.80 dst-port=xxxxxxxx protocol=
tcp to-addresses=192.168.0.80 to-ports=xxxxxxxx
add action=dst-nat chain=dstnat comment=“192.168.0.3 server” dst-port=xxxxxxxx
protocol=tcp to-addresses=192.168.0.3 to-ports=xxxxxxxx
add action=dst-nat chain=dstnat dst-port=7024 protocol=udp to-addresses=
192.168.0.3 to-ports=xxxxxxxx
/ip route
add check-gateway=ping comment=“Routing ISP 2” disabled=no distance=1
dst-address=0.0.0.0/0 gateway=1.1.1.1 pref-src=“” routing-table=to_WAN2
scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping comment=“Routing ISP 1” disabled=no distance=1
dst-address=0.0.0.0/0 gateway=1.0.0.1 pref-src=“” routing-table=to_WAN1
scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping comment=“Default ISP 1” disabled=no distance=1
dst-address=0.0.0.0/0 gateway=1.0.0.1 pref-src=“” routing-table=main
scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping comment=“Default ISP 2” disabled=no distance=2
dst-address=0.0.0.0/0 gateway=1.1.1.1 pref-src=“” routing-table=main
scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping comment=“Failover ISP 1” disabled=no distance=2
dst-address=0.0.0.0/0 gateway=1.0.0.1 pref-src=“” routing-table=to_WAN2
scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping comment=“Monitor ISP 1” disabled=no distance=1
dst-address=1.0.0.1/32 gateway=192.168.1.1 pref-src=“” routing-table=main
scope=10 suppress-hw-offload=no target-scope=10
add comment=“Monitor ISP 2” disabled=no distance=1 dst-address=1.1.1.1/32
gateway=192.168.2.1 pref-src=“” routing-table=main scope=10
suppress-hw-offload=no target-scope=10
add check-gateway=ping comment=“Failover ISP 2” disabled=no distance=2
dst-address=0.0.0.0/0 gateway=1.1.1.1 pref-src=“” routing-table=to_WAN1
scope=30 suppress-hw-offload=no target-scope=11
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set api disabled=yes
set winbox port=xxxxxxxx
set api-ssl disabled=yes
/routing bfd configuration
add disabled=no interfaces=all min-rx=200ms min-tx=200ms multiplier=5
/system clock
set time-zone-name=Europe/Athens
/system identity
set name=test
/system note
set show-at-login=no
And in windows client:
[Interface]
PrivateKey =XXXXXXXXXXXXXXXXX
Address = 192.168.70.4/32
DNS = 192.168.70.1[Peer]
PublicKey = XXXXXXXXXXXXXXXXXXXXXXXX
AllowedIPs = 192.168.70.0/24, 192.168.0.0/24
Endpoint = XXXXXXXX:xxxxxxxx
PersistentKeepalive = 10
sorry my bad english. thnks in advance..