We have a multi-WAN setup and want to route all Wireguard traffic through a specific WAN interface, pppoe-vpn, which is assigned a static IP at ISP level. Here's the network diagram:
And this is the config:
Code: Select all
# RouterOS 7.6
# model = RB750Gr3
/interface bridge
add admin-mac=xx:xx:xx:xx:xx:xx auto-mac=no comment=defconf name=bridge
/interface pppoe-client
add disabled=no interface=ether1 name=pppoe-backup use-peer-dns=yes
add disabled=no interface=ether1 name=pppoe-vpn use-peer-dns=yes
add disabled=no interface=ether1 name=pppoe-wa use-peer-dns=yes
/interface wireguard
add listen-port=54321 mtu=1420 name=wireguard0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip pool
add name=dhcp ranges=192.168.10.101-192.168.10.254
/ip dhcp-server
add address-pool=dhcp interface=bridge lease-time=12h name=dhcp0
/port
set 0 name=serial0
/routing table
add disabled=no fib name=vpn
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set rp-filter=loose
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-vpn list=WAN
/interface wireguard peers
add allowed-address=192.168.9.3/32 comment=mac interface=wireguard0 \
persistent-keepalive=25s
/ip address
add address=192.168.10.83/24 comment=defconf interface=bridge network=\
192.168.10.0
add address=192.168.9.83 comment="wireguard interface local ip" interface=\
wireguard0 network=192.168.9.0
/ip cloud
set ddns-update-interval=15m
/ip dhcp-client
add comment=defconf disabled=yes interface=ether1
/ip dhcp-server lease
add address=192.168.10.93 lease-time=23h59m59s mac-address=yy:yy:yy:yy:yy:yy \
server=dhcp0 use-src-mac=yes
/ip dhcp-server network
add address=192.168.10.0/24 comment=defconf dns-server=192.168.10.83 gateway=\
192.168.10.83 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.10.83 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="accept wireguard" dst-port=54321 \
in-interface=pppoe-vpn protocol=udp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
disabled=yes ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
disabled=yes ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related disabled=yes hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=mark-routing chain=prerouting comment=\
"mark wireguard connections - prerouting" dst-port=54321 \
new-routing-mark=vpn passthrough=no protocol=udp
add action=mark-routing chain=output comment=\
"mark wireguard connections - prerouting" new-routing-mark=vpn \
passthrough=no protocol=udp src-port=54321
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface=pppoe-vpn
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface=pppoe-wa
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-wa pref-src="" \
routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-vpn \
routing-table=vpn scope=30 suppress-hw-offload=no target-scope=10
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system clock
set time-zone-name=Africa/Johannesburg
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/tool sniffer
set filter-interface=all filter-ip-protocol=udp filter-port=54321
Disabling these 2 mangle rules...
Code: Select all
/ip firewall mangle
add action=mark-routing chain=prerouting comment=\
"mark wireguard connections - prerouting" dst-port=54321 \
new-routing-mark=vpn passthrough=no protocol=udp
add action=mark-routing chain=output comment=\
"mark wireguard connections - prerouting" new-routing-mark=vpn \
passthrough=no protocol=udp src-port=54321
...and attempting to connect a peer through the static IP yields the following via the packet sniffer (actual listening port redacted but let's pretend it's 54321 as per above config):
The packet is received through the pppoe-vpn interface but is responded to from the pppoe-wa interface - the default interface. As a result, no handshake takes place.
Enabling the 2 mangle rules yields the following result:
The packets are being responded to on the correct interface but
1. There is a big delay in the response.
2. The response is not being sent through the same port it was requested from - the peer is connecting from port 24099 but the response is being sent to port 22505.
As a result, no handshake takes place.
Some info that may or may not be relevant:
1. The static IP of interface pppoe-vpn is assigned at ISP level. On the router itself, we get assigned a dynamic NAT'ed (we beg pardon if this isn't the correct term) IP (10.230.68.216 in this case) and we don't see the actual static IP anywhere on the router.
2. When using pppoe-vpn as the default gateway using the default routing table, the handshake takes place without issue.
Please advise, oh wise Ones - what are we doing wrong?