Sorry friend for the late response...
But for some reason or another (most likely a Layer 8 issue),
I had some problems recreating your Setup in my LAB...
Nevertheless, I was able to achive the Result you desire
Step 1: Wireguard
Configured Wireguard Site-2-Site as recommended on Mikrotik Website (
https://help.mikrotik.com/docs/spaces/R ... /WireGuard)
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface wireguard peers
add allowed-address=0.0.0.0/0 endpoint-address=x.x.x.x endpoint-port=13231 interface=wireguard1 name=peer1 persistent-keepalive=25s public-key="fsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsd"
**This is most likely what you also did, resulting in a working VPN-Connection, but no "Internet" Traffic flowing thru, as the Default-Gateway (0.0.0.0/0) was still assigned to the ether1-Interface. Resulting in you having to create some additional "/IP/Route" , that are no longer needed in this setup.
Step 2: Routing-Table
Created an additional Routing-Table called "VPN"
/routing table
add disabled=no fib name=VPN
and added a Default-Gateway Route thru the Wireguard-Tunnel
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=10.255.255.1 routing-table=VPN scope=30 suppress-hw-offload=no target-scope=10
*** I used the IP-Addresses from the Mikrotik-Exemple, but in your Setup, you will need to change "10.255.255.1" to "10.2.0.1" ( assuming that the Export you provided is still accurate)
Step 3: NAT
Created a NAT-Rule
/ip firewall nat
add action=masquerade chain=srcnat out-interface=wireguard1
*** You already have this correctly configured
Step 4: Mangel
The following isn`t optimal YET, I just didn`t have the Time to refine the Rules .
I created an Address-List, that contained Local-Network`s that should NOT go thru the
Wireguard-Tunnel.
/ip firewall address-list
add address=10.1.22.0/24 disabled=no dynamic=no list=LocalAddress
add address=192.168.88.0/24 disabled=no dynamic=no list=LocalAddress
and made a very VERY basic Mangle-Rule that assigns the Routing-Table "VPN" to anything from the LAN going to the Internet.
/ip firewall mangle
add action=mark-routing chain=prerouting dst-address=0.0.0.0/0 dst-address-list=!LocalAddress in-interface=bridge new-routing-mark=VPN
Again, please see the last Step / Mangel-Rule as a Proof of Concept....
If you make the changes to your router, All your Traffic from you LAN should still only go thru your Wireguard-Tunnel
But we can then create some new mangel-rules that target specific Devices in your LAN to bypass the VPN and/or specific Services.
*P.S: Don`t forget to Backup your Device before making changes to it. :D