This is an old revision of the document!
Incomplete
http://wiki.mikrotik.com/wiki/Manual:IP/IPsec
https://help.mikrotik.com/docs/display/ROS/WireGuard
HowTo: https://forum.mikrotik.com/viewtopic.php?t=182340
Road Warrior HowTo: https://forum.mikrotik.com/viewtopic.php?p=899406
First we configure the admin
password:
Use Quick Set for basic router configuration:
Create the WireGuard VPN interface:
Define a WireGuard VPN peer:
Show a connected peer:
Add an IP address to the WireGuard interface:
Add a static route for remote IP subnet behind peer:
At this point, you should be able to ping devices to or from the subnets behind either router.
# the interface name is arbitrary - wg0, wg1 are common - wireguard1 is the default # the port is also arbitrary - 51820 is customary - choose UDP port not blocked by ISP # listen port probably doesn't matter on this end /interface wireguard add listen-port=51820 mtu=1420 name=wireguard1 # the peer is the remote side definition - server in this case # allowed addresses are addresses at the remote side - server in this case # the public key is the public key of the remote side - server in this case # endpoint port must match remote listen port - server in this case /interface wireguard peers add allowed-address=172.16.2.1/32,192.168.50.0/24 comment="Server Site Name" \ endpoint-address=<server-public-ip> endpoint-port=51820 interface=wireguard1 \ persistent-keepalive=25s public-key="<server-public-key>" # assign an address to the wireguard interface - will show in traceroute # address choice is arbitrary - /24 used to route multiple peers of /32 /ip address add address=172.16.2.3/24 interface=wireguard1 network=172.16.2.0 # you must add a static route to the subnet(s) behind the remote peer - server in this case /ip route add disabled=no dst-address=192.168.50.0/24 gateway=wireguard1 \ routing-table=main suppress-hw-offload=no