I have not been down that road before. Never even installed the package. I might take a look, but I would prefer something more confortable for an "old tech" guy.....Zerotier
Different subnets can also reside in one single LAN....based on the OPs post "as if it was a single LAN (all devices in site1 can communicate with all devices in site2," ...
100% better solution is WireGuard just as @holvoetn stated plus WireGuard Security is second to none without sacrificing performance ...Add one to the mix
Wireguard. A lot faster then all the rest.
I also use a GRE + IPSec for a L2 tunnel.For LAN-LAN connections I would suggest setting up a GRE tunnel with IPsec encryption (just add a GRE tunnel interface and enter the IPsec secret to auto-configure IPsec), that will be hardware-accelerated on most MikroTik routers (contrary to those other protocols).
Well, what if the Warehouse was natted? Couldn't it be done? I think it could.....For Wireguard... Someone has to have a public address.
We have the office, bosses home and warehouse.
Office is behind carrier grade NAT from a Wisp.
Home is behind starlink.
Warehouse is the one with a public IP.
Warehouse is set up as the server... The other sites connect to it.
Road warriors also connect to the warehouse.
Once connected... Any site is reachable via IP. All layer 3.
I see now what you meant. Never crossed my mind that an ISP would assign you a private IP.....humbfig
If the warehouse router was DMZ'd behind a GATEWAY (Modem+Router+WiFi), THAT HAS A PUBLIC IP ADDRESS...
Yes that would work.
I always have a public IP everywhere. The worst it can get to me is when I have to do NAT on the ISP router.As long as one end always has a public IP, normal WG is fine for Layer 3. To make it one LAN, you'd need to use GRE, EoIP (without IPSec) or VXLAN interface too to carry the Layer-2 ethernet traffic between the sites.
Now if both sides have private/NAT address and without some DMZ option enabled...(and assuming the ARM-based router) ....that's when you'd need to use ZeroTier for the tunnel.... OR the brand-new BTH WG feature (also need a GRE/EoIP/VXLAN L2 tunnel too). The later BTH feature will tunnel encrypted WG traffic via servers at Mikrotik. But depending on your location, BTH may actually be even slower than ZeroTier. Why it's important to get a public IP if you can...as y'all have both more and faster options...than these ones.
And, for completeness...if BOTH sides had a public IP... just EoIP with IPSec enabled is dirt simple and efficient (e.g. you set the pre-shared key, put remote public IP as dest on both, bridge EoIP to desired LAN). But EoIP with IPSec requires BOTH side have public IP. (While EoIP using WG doesn't need public IP, since EoIP uses the WG address as the tunnel dest IP)
Heard you all. Read a few things. I will try the route GRE + IPSEC, since it seems to fit better what I want and also my hardware. I'm ready for the IPSEC headache, though you say it will be easy.Hear you about IPSec, but for a Layer-2 tunnel the nice part about EoIP is that the IPSec stuff is really just a checkbox and setting a pre-shared key. Since you'd already need another protocol with WG to get ethernet. But WG + GRE is another option if you want keep wireguard but bridge a layer-2 LAN. But EoIP for layer is dirt simple, it deals with all the IPSec config for you.
If just layer-3 IP routing is all that's need, well then it's just WG
And on the hEX is the channel set to "upgrade", that's how you get from V6 to V7. Once at V7, you can switch the /system/package channel back to stable or testing.
Well, I'll buy the aspirin. Do think the secret is, well, ipsec-secret= set (either EoIP or WG) if Layer2 tunnel is what's needed and you have public IP at both ends. If only Layer3/IP, no argument with WG thereI will try the route GRE + IPSEC
I might be confused. I thought GRE and EoIP were the same thing.....Well, I'll buy the aspirin. Do think the secret is, well, ipsec-secret= set (either EoIP or WG) if Layer2 tunnel is what's needed and you have public IP at both ends. If only Layer3/IP, no argument with WG there
I will try the route GRE + IPSEC
yep, thanks. I got it.EoIP interface is layer-2. EoIP use the GRE protocol internally, but inside the GRE packet is an Ethernet frame.
Mikrotik also has a different "GRE interface", but that is only Layer3/IP, so similar to L3 WireGuard in that it's an IP packet inside the tunnel.
Both EoIP and GRE support the ipsec-secret= which should automatically setup the IPSec stuff. But you do likely want to try EoIP, not GRE...
(and IPSec should be hardware offloaded on hEX)
How I think it should be done:I tried the EoIP tunnel and could not make it work. As far as I understand I need 2 public IP's on both routers and one of the routers has a private address (DMZ) because the ISP router does not allow for bridge mode.
Yup, if don't have two public IPs, then @holvoetn has it right. You'd want to disable IPSec in EoIP, and use the far-end WG addresses in the EoIP src/dest fields.How I think it should be done:I tried the EoIP tunnel and could not make it work. As far as I understand I need 2 public IP's on both routers and one of the routers has a private address (DMZ) because the ISP router does not allow for bridge mode.
-You need to setup wireguard (only 1 side needs to have a real public IP)
-Set an IP address on both ends of that connection
-Use those 2 addresses to setup EOIP
-Add EOIP to bridge on both ends
Well, but that doesn't really answer the question. Why doesn't the wireguard interface in R1 forward to the l2tp interface?Yup, if don't have two public IPs, then @holvoetn has it right. You'd want to disable IPSec in EoIP, and use the far-end WG addresses in the EoIP src/dest fields.
How I think it should be done:
-You need to setup wireguard (only 1 side needs to have a real public IP)
-Set an IP address on both ends of that connection
-Use those 2 addresses to setup EOIP
-Add EOIP to bridge on both ends
I only mentioned EoIP+IPSec since the hEX CPU does show its age with WG – but that's not possible unless you can use public IP at both ends. Since WG is fine with NAT on ONE end, essentially you replace IPSec with WG, but rest of EoIP bridging is same.
That's probably true. Trying to steer you away from L2TP + WG for Layer2 needs to EoIP + WG if you have only one end with public IP. L2TP probably can work, but it's terrible complex between IPSec policies and the firewall, so I don't have any quick answer. Essentially L2TP make a couple trips through the firewall, so needed rules start getting very complex...Well, but that doesn't really answer the question. Why doesn't the wireguard interface in R1 forward to the l2tp interface?
I'm not 100% sure you're right, maybe? Just IPSec encryption is/should-be offloaded on a hEX, while CPU is needed for WG encryption. IPSec encryption "offloading" is different than switch-chip offloading. So results depend on how loaded the CPU for WG performance.On a device without hw offloading, WG is always faster then IPSEC ( and definitely L2TP/IPSEC).
Key difference is the hEX has IPSec offloading while RB2011 doesn't... Without IPSec encryption offloading, I'd totally imagine WG would be faster...
This make sense. But issue is a hAPax or RB4011 ARM is way more powerful than hEX-S MIPS...so less CPU available for things on hEX...When using WireGuard, the speed in the channel is slightly higher. So as is the CPU load.
Exactly. I think OP want's Layer2 bridging. So IMO, on a hEX/hEX-S, since EoIP+IPSec isn't possible here, and OP has WG so EoIP+WG seem like best fit. But OP running into issue with WG, so tried L2TP I think.Why both ?
Wg is already an encrypted vpn.
I'm not sure what a sanitized config would look like.....Exactly. I think OP want's Layer2 bridging. So IMO, on a hEX/hEX-S, since EoIP+IPSec isn't possible here, and OP has WG so EoIP+WG seem like best fit. But OP running into issue with WG, so tried L2TP I think.Why both ?
Wg is already an encrypted vpn.
Anyway, if the OP posted some diagram and/or sanitized config, might help.
You might be right. But my ultimate goal is a L2 tunnel. And I even have ipsec offload on both routers. That is why I was aiming for EoIP. Both sites have public IP's, but R1 is behind a ISP router that doesn't do bridge mode.WG between both sites has to work, provided config is ok.
But we never saw that ?
Export config of both routers with wireguard configured.
terminal
/export file=anynameyouwish
Remove serial number, public wanip, private keys, ...
Post config of both devices separate between code quotes (easier to read).