Long story short, I have 2x sites (imaginatively named SiteA + SiteB) and I'm having some issues getting Wireguard/Mikrotik to obey the rules I've setup.
As an example, I can ping the Site B LAN IPs from the Mikrotik at Site A and vice versa, but trying to ping from SiteA's LAN devices to Site B's LAN devices, it always fails. This is backed up with changing the interface on the ping command on each Mikrotik to simulate an end-device:
Code: Select all
Site A > SiteB (no int specified):
[admin_usr@sitea.domain.com] > ping 10.13.37.2
0 10.13.37.2 56 63 33ms602us
1 10.13.37.2 56 63 33ms373us
2 10.13.37.2 56 63 33ms315us
sent=3 received=3 packet-loss=0% min-rtt=33ms315us avg-rtt=33ms430us max-rtt=33ms602us
Site A > SiteB (LAN to LAN):
[admin_usr@sitea.domain.com] > ping 10.13.37.2 interface=BRIDGE_SITEA_LOCAL
SEQ HOST SIZE TTL TIME STATUS
0 packet rejected
1 packet rejected
2 packet rejected
3 packet rejected
sent=4 received=0 packet-loss=100%
Site B > SiteA (no int specified):
[admin_usr@siteb.domain.com] > ping 10.13.38.2
0 10.13.38.2 56 63 31ms602us
1 10.13.38.2 56 63 31ms373us
2 10.13.38.2 56 63 31ms315us
sent=3 received=3 packet-loss=0% min-rtt=33ms315us avg-rtt=31ms430us max-rtt=31ms602us
Site B > SiteA (LAN to LAN):
[admin_usr@siteb.domain.com] > ping 10.13.38.2 interface=BRIDGE_SITEB_LOCAL
SEQ HOST SIZE TTL TIME STATUS
0 packet rejected
1 packet rejected
2 packet rejected
3 packet rejected
sent=4 received=0 packet-loss=100%
When I try to ping the Wireguard interfaces of the local or the peer WG, it works fine from LAN devices.
Hopefully this is irrelevant, but each site has some EOIP tunnels for VLANs 20/40 respectively, these are important because the devices connected to those VLANs can only ever go across to the tunnel and should never go across the local internet directly. The idea at the time was that if the opposite side was serving the DHCP IP, then that's a fairly good safety net to prevent leakage. That and it's nice to have L2 on the opposite side for a few scenarios. They generally have no need to access the LAN/IoT subnets and is purely as a means for changing the public IP to the opposite site, as such they live in their own subnets (10.0.20.0/24 / 10.0.40.0/24). Anyway, EOIP has been working great at both locations, so I don't think this is related.
I've turned logging on for all firewall rules to see if it's hitting any of the drop rules, but I'm not seeing anything of value and I'm
I've thrown this diagram together and attached some configs, would really appreciate any help as I'm getting nowhere!
Diagram: