This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
networking:router:mikrotik_vpn_wg [2023/07/01 21:01] gcooper |
networking:router:mikrotik_vpn_wg [2023/07/10 10:36] (current) gcooper |
||
---|---|---|---|
Line 12: | Line 12: | ||
**Road Warrior HowTo**: https:// | **Road Warrior HowTo**: https:// | ||
+ | |||
+ | **Why WireGuard? | ||
+ | |||
+ | **Enable/ | ||
<note tip>Note that **Windows workstations do not respond to pings by default**, but will if you temporarily disable the firewall. | <note tip>Note that **Windows workstations do not respond to pings by default**, but will if you temporarily disable the firewall. | ||
Line 26: | Line 30: | ||
< | < | ||
- | # add a wireguard interface - name is arbitrary - select port not blocked by all ISPs | + | # perform the next three commands only once |
- | /interface wireguard | + | |
- | add comment=" | + | |
- | # define remote | + | # allow wireguard |
- | # allowed addresses are remote peer address and address ranges behind | + | /ip firewall filter |
- | /interface wireguard peers | + | |
- | add allowed-address=172.16.2.3/ | + | |
- | | + | # add a wireguard interface |
+ | /interface wireguard add comment="WireGuard VPN Endpoint" | ||
# set the address of the wireguard interface - the address is arbitrary | # set the address of the wireguard interface - the address is arbitrary | ||
- | # we use a /24 netmask to include all peers - name must match interface name above | + | # we use a /24 netmask |
- | /ip address add address=172.16.2.1/ | + | # name must match interface name above |
+ | /ip address add address=172.16.2.1/ | ||
+ | |||
+ | # do the following for each remote site | ||
+ | |||
+ | # define remote wireguard peers - be sure to identify peer with comment | ||
+ | # allowed addresses are remote peer address and address ranges behind the remote peer | ||
+ | /interface wireguard peers add allowed-address=172.16.2.3/ | ||
+ | interface=wg0 persistent-keepalive=25s public-key="< | ||
- | # allow connections | + | # add a route to the subnet(s) behind the remote peers |
- | /ip firewall filter | + | /ip route add comment=" |
</ | </ | ||