It's a while ago now. Can you guys confirm it will be fixed in the mentioned version, any news?Supposedly fixed in 7.15beta6.
There is also a workaround if you modify the logging rules to numb down those messages but in my book these shouldn't even be displayed (it's debug, not info)
still occuring BTH iOS and 7.14.3; checked 3d agoFixing what specifically? Abundance of Wireguard logs? That was already fixed
It's not in the `/wireguard/export` because it's "dynamic config" (i.e.configuration generated by another RouterOS option). And dynamic config is never in an export – think /ip/dhcp-client and /ip/address/export. So like elsewhere, "/wireguard/print detail" is what's needed to "see" BTH stuff. And /ip/firewall/.../print etc. too. Basically you'll see more "D" items from BTH in a few places.Okay understand I may be looking at a BTH setup incorrectly done on an Ops MT router and thus the missing export info?
You'll find the BTH users on the IP>Cloud window, from there you could delete the usersI already have several working Wireguard connections, but I also wanted to try this function.
Since then, I have a dynamic entry that can no longer be deleted. How can I remove it?
Thank you,
v 7.15.3
-faxxe
Create screenshot from Winbox or Webfig.How do I create QR codes from a standard setup ( hole punch not required ), that I can whatsapp to remote devices for them to ingest??
In documentation is stated "...create a new configuration from scratch" :), even it is possible to create peer QR code as in my screenshot example, that was why @anav is wondering why such possibility is not documented.iOS configuration
Download the WireGuard application from the App Store. Open it up and create a new configuration from scratch.
What?Regarding "GOAL", why mix manual WG setup with BTH app? Better to have ability to export/share configuration of such peers (from manual WG setup) in MT mobile app (not BTH) or in Winbox to have ability to save QR image without need to create screenshot, to use as configuration import into official WG client mobile app.
Well, the share link returns HTML that requires JavaScript. So if FB tries to "unfurl" (e.g. click the link, to summarize content for a message stream), the BTH link is only a redirect to the App Store with no HTML body - and FB may not like a link that leaves the app or needs JavaScript to render...i was trying with facebook messenger.
teams , whatsapp and messenger - all working
<html>
<head>
</head>
<body>
<script type="text/javascript">
var userAgent = navigator.userAgent || navigator.vendor || window.opera;
if (/android/i.test(userAgent)) {
window.location.replace("market://details?id=com.mikrotik.android.freevpn");
}
else if (/iPad|iPhone|iPod/.test(userAgent) && !window.MSStream) {
window.location.replace("https://apps.apple.com/us/app/mikrotik/id6450679198");
}
else {
window.location.replace("https://mt.lv/bth");
}
</script>
</body>
</html>
Much thanks for these efforts!Regarding the TOPIC
We have updated the manual with the Share function info (APP side) https://help.mikrotik.com/docs/display/ROS/Back+To+Home
Did you look in /ip/cloud/print (first BTH user), or /ip/cloud/back-to-home-users/show-client-config XX (2nd or more BTH users)?Trying to understand BTH some more.
Is this correct??
Bizarre that I cannot do this FROM or AT the router ?????
The docs aren't entirely clear, but the "share" ones should have QR codes in RouterOS under IP > Cloud > Back-to-Home User. And if you created a share on the phone, the WG peer config will be there. If you use the "New" in the /ip/cloud/back-to-home-users in winbox to create new BTH users, while you'd pick a key when you do it that way & since winbox isn't a phone, it cannot forward it directly via SMS/email/etc - but the "new" in winbox do same as app.Hi Ammo reading the docs there is only one qr/code one can generate from the router itself, the rest if I read this right, is that you can easily create and manage additional Qr codes and send them all from the admin smartphone.
The docs aren't entirely clear, but the "share" ones should have QR codes in RouterOS under IP > Cloud > Back-to-Home User. And if you created a share on the phone, the WG peer config will be there. If you use the "New" in the /ip/cloud/back-to-home-users in winbox to create new BTH users, while you'd pick a key when you do it that way & since winbox isn't a phone, it cannot forward it directly via SMS/email/etc - but the "new" in winbox do same as app.Hi Ammo reading the docs there is only one qr/code one can generate from the router itself, the rest if I read this right, is that you can easily create and manage additional Qr codes and send them all from the admin smartphone.
Now, I might not be understanding the problem. And agree docs are entirely clear about the QR codes for 2nd/"shared" users: https://help.mikrotik.com/docs/spaces/R ... me-IPCloud
But under IP > Cloud in winbox should have QR code for the main user and shared users from app.
But you can try in winbox, or via CLI too:In other words, the router itself can only generate one setup via BTH, the rest have to be done from the Admins smartphone.
Just waiting for NORMIS to confirm!
/ip/cloud/back-to-home-users/add allow-lan=no comment="2nd user - added from RouterOS" name="$[/system identity get name] 2nd user"
:delay 2s
/ip/cloud/back-to-home-users/show-client-config [find name~"2nd"]
/interface/wireguard/peer/print
/interface/wireguard/peer show-client-config [find comment~"2nd"]
Except I'm not wrong. All BTH are just WG peers, and have QR codes. So just like any other peer, don't use the same peer twice. The advice to first one (/ip/cloud), applies to the shared ones too (/ip/cloud/back-to-home-user) - don't use them twice as they have an IP address assigned in peer's client config.anav:1 ammo:0 ( but whose counting)
The peer is created by BTH app when initially shared, it has nothing to do if the end user "accepts" or uses it. The shared peer will appear under /ip/cloud/back-to-home-users once shared.I also understand that once folks have accepted the qr code on their smartphone app, or wireguard client app (laptops), etc. the results show up on the associated MT Routers IP Cloud tabs ( users ) and can be configured further if required ( add access to subnets, delete, and probably other options ).
Now here we agree. :)Now if we can just crack the Routing BUG and wireguard with multi WANs.........
Perhaps describing how it works "under the covers" might help these questions in the future. AFAIK, from RouterOS and WG client, BTH is still just a WG peer - just with DNS name that MAY use Mikrotik's custom "WG proxy" server & some dynamic firewall rules based on /ip/cloud/back-to-home-users allow-lan=.The back-to-home-users menu is a new menu, this is why some of the documentation is conflicting. We will fix that.
Disagree, the only thing in common is that they use the same wireguard interface.It's WG, so all are peers. The app and /ip/cloud just always create ONE peer upon enabling it. If you need more, you need the "managed shared" (or /ip/cloud/back-to-home-users). On the "shared" ones, there is the additional option to allow-lan= so that the only difference AFAIK.
So there is actually no difference from a shared user/peer (if allow-lan=yes) and the "MASTER" one.
Now I get the confusion. The thing is you can use a normal WG client app with the BTH config from /ip/cloud/back-to-home-users, and it work the same as for the 2+ BTH peers.The ROUTER initiated client peer, ( the one that should go on the admins smartphone ) can, via Managed Shares, create additional peer clients to the same router. The client peers (second created to infinity) CANNOT create additional peer clients.
They are not equal.....
That why the app is more confusing. Yes, BTH is also a wireguard client too - beyond it role to configure BTH. So, yes, the shared ones don't need the router user/password. But the provisioning step can always be done with "Create New" in app - which is where you need router user/password to do. Now how the app works is not the hill I'm going to die on, so could be slightly off –as I said it's MORE confusing than winbox/CLI - at least to me.Not sure what you mean. If a user (not admin) uses the BTH app to setup a BTH tunnel after receiving the QR code, or URL link or export config file generated on the admins smartphone, then the user access is done through the BTH app, not the standard wireguard app.
Nope. It should work, or at least that's how I use a BTH "shared user" on my Mac. And just retested with cut-and-paste client config from the "2nd BTH" user CLI shown. which was actually my 3rd user ... so it got automatically assigned an 192.168.216.4 / ::4 - since the default values will automatically use the next greatest IP with BTH subnet.Now what has not been explained at least to my knowledge and not in docs, is what happens if I take that QR code (a user generated by Manage Shares ) and try to import into the regular plain wireguard app. Me thinks its proprietary to the MT BTH setup and thus would not work on the ordinary wireguard app.
Assuming you were NOT already using the "Main"/MASTER client on your phone already. Otherwise, you'd need to hit the "Back to Home User" button in IP>Cloud to get the 2nd++ "peer".do the dirty deed by using the QR code generated in the BTH VPN WireGuard Tab selection ( identical to /ip/cloud/print ( this entry is meant to be used when only a single user presumably admin is involved ).
Can we agree to blame Mikrotik's docs? :)You know its very annoying that your right ;-)
On firewall, there is an address-list named "back-to-home-lan-restricted-peers" in /ip/firewall/address-list that get dynamically added by BTH code on RouterOS If "allow-lan=no" in /ip/cloud/back-to-home-users.I am working on that bit ( improving docs ) and is why I am being nitpicky in my understanding.
I forget, where do the firewall rules show up that allow a USER to access the WAN and possibly the LAN???
BTH also adds a NAT rule just by enabling BTH for the 1st peer:0 D ;;; back-to-home-vpn
chain=forward action=drop
src-address-list=back-to-home-lan-restricted-peers
out-interface-list=LAN
1 D ;;; back-to-home-vpn
chain=input action=accept protocol=udp dst-port=25297
0 D ;;; back-to-home-vpn
chain=srcnat action=masquerade src-address=192.168.216.0/24
/ip/cloud DDNS being enabled is required for BTH. And they use an additional DNS FQDN per router for the endpoint <sn>.vpn.mynetname.net. And that's what's used as the "Endpoint" in WG config. The value of the *.vpn.mynetname.net name is EITHER a public IP detected by /ip/cloud's DDNS, or if DDNS detects a NAT then DNS name resolves to Mikrotik BTH reply.Hmm, let say that ROS device WAN access at certain point is changed, goes behind CGNAT or oposite while BTH WG configuration is already shared, then in such case shared configuration becomes invalid? Assuming that shared WG peer endpoint is set in config to host depending when shared configuration is made, it doesn't seem flexible for LTE mobile routers (in some cases WAN access can be behind CGNAT or not if MO SIM is changed...). I would love to see plain text config for shared WG peer from QR to understand this, don't have BTH setup on my router to check...
# Name = bigdude 2nd user
# CloudDDNS = xxxx0a11yyyy.sn.mynetname.net
[Interface]
ListenPort = 51820
PrivateKey = AbcdAbcdiroehZ7kxlFj52qGrzAZogUk3kllvAbcd=
Address = 192.168.216.4/32, fc00:0:0:216::4/128
DNS = 192.168.216.1
[Peer]
PublicKey = Zxywo/62fHo/pe0g1JFdEkNZTHhZxywLdF+2ZxywFhz=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = xxxx0a11yyyy.vpn.mynetname.net:25297
PersistentKeepalive = 30
[Peer]
PublicKey = //////////////////////////////////////////8=
AllowedIPs = 0.0.0.0/32
Endpoint = xxxx0a11yyyy.sn.mynetname.net:25297
PersistentKeepalive = 15
That I was assuming when I wrote previously that DDNS host IP is changing depending on public access and it makes sense to work like that to have WG endpoint available in any WAN access case. Thx for clarifying and config sample.The value of the *.vpn.mynetname.net name is EITHER a public IP detected by /ip/cloud's DDNS, or if DDNS detects a NAT then DNS name resolves to Mikrotik BTH reply.
I know it does switch, but not sure the exact timing. I'd imagine it follows the value ddns-update-interval= under /ip/cloud to update if DNS name uses replay/proxy or direct, plus the DNS TTL — but I did not explicitly test this. I do know it will switch modes, and the WG clients don't care, other than not working while the DDNS is updated/expire-from-cache.
Yup. Just WG peer, with special DNS name.So in summary, its transparent to the end user, and hence why both apps can be used.
Kinda both.I want to know more about this line............ In case of going through relay, speed could be limited.
Clearly we have limits on client end for ISP, and limits at Router end from its associated ISP connection and then there are losses due using VPN.
So are they saying on top of that there may be additional losses due to
a. bottleneck at Servers ( heavy load )?
b. depends on physical distance from server?
The URL LINK from app is different. It's a some web page with tricks that redirects (which can be URL to apps) — so that one is different. But the QR code and config file are identical - QR codes just store bytes, so its just stores the same ASCII config file in QR code as bytes (which you can verify on Linux/Mac with zbarimg from a screen grab of QR).Also the Manage shares creates three methods. need to confirm the below.......
AN URL LINK ( assuming this works only with the BTH app - limited to smartphones with the BTH app )
A QR code which works with both BTH app and wireguard app - so good for all devices
A config file which is primarily designed for PCs and wireguard app.
Lastly, when one selects the URL link to share or the CONFIG file, apparently the smartphone automatically prompts using the standard share choices, to send the LINK or config file to another person.........
BUT what about the second QR code method. In the DOCS it says view.
SO no automated cell phone prompts? Does one have to physically select it to get the cell phone prompts, do you have to take a screen shot............what is the process........not clear for QR code.
When I hear mangle and WireGuard ... often there are "strange" interactions. I guess my question is does /ip/cloud say "behind a NAT"? AFAIK that what's triggers using the proxy method in my observation - but could be wrong.I have a question about relaying. My Mikrotik router is behind a CGNAT connection, so the IPv4 address I receive from my provider is not directly accessible from outside. I have assigned a static IPv4 via an IPIP6 tunnel through a server and added a global route in a separate routing table. With the appropriate mangle entries, an existing Wireguard configuration works perfectly through it.
[...]
You dont do anything....No, I’m not using mangle for Wireguard but rather to get DDNS detection to recognize the static IPv4 instead of the one behind my provider’s CGNAT. The static IPv4 is not forwarded via NAT but routed through the IPIP6 tunnel. This has been working flawlessly in manual configuration for years.
Yes, it says "Router is behind a NAT. Remote connection might not work". But I’m wondering why BTH doesn’t even try to reach the IP address that's used for DDNS. What’s the point of hole punching if it doesn’t even attempt to reach the known IP?
Now you got me confused... But the BTH user IP address range is 192.168.216.2...X, so you can always use IP in a firewall rules (or address-list too) — but this match the config assigned the /ip/cloud/back-to-home-users... So you always know the client IP from the saved config. So I'm not sure the added step to determine the client IP is needed. Maybe I'm not getting the problem, too....@Ammo: does this sound right.
Challenge: Allow BTH users to go out internet and LAN.
a. Establish BTH network with 5 users plus admin
b. Do select NO for lan access initially --> I have a reason. :-)
Go to /ip/firewall/address-list and copy down all the user Ip addresses.
c. Unselect NO for lan access ( so users can acccess LAN)
d. Go to /ip firewall address-list and MANUALLY RECREATE the list.
Name it, BTH TO WAN
/ip firewall adddress-list
add userIP1 list=BTH-to-WAN
add userIP1 list=BTH-to-WAN
....
add userIP6 list=BTH-to-WAN
e. add firewall rule
add chain=forward action=accept comment="Bth users Internet" src-addres-list=BTH-to-WAN out-interface-list=WAN
Yup, admin/"1st user" is 192.168.216.2, and any added BTH users/"2nd+ users" start at .3, ...I am not aware of the address range used, so you are saying it starts the first one given to the admin on his smartphone as 192.168.216.2 and the next .3 and so forth.
Well, as I wrote. BTH uses the IP I have via CGNAT and not the static IP even if I force the DDNS service to detect the static one. That leads into the situation that BTH works only via relaying over IPv4 and not direct connection. But the connection over my server and the static ip is much faster then the relay service from mikrotik.You dont do anything....
Just enable IP cloud and BTH and the router handles the connection.
Yes you will.So your saying that I ping your public IP it will get to you??
In that case why are you even using BTH, I mean if you have a public IP??
So I can reach a server on your LAN easily then.
Well your mixing in IPV6 into BTH or regular wireguard and I know nothing about such freaky things, its on par with capsman, a complexity I joyfully live without. :-)Yes you will.So your saying that I ping your public IP it will get to you??
In that case why are you even using BTH, I mean if you have a public IP??
So I can reach a server on your LAN easily then.
Because BTH is a bit simpler to configure (via app) and should work even if my (IPIP6) tunnel is temporarily offline.
"The Dude" literally includes the word "dude". But how can a software be a dude? So please be serious: BTH is a product name. It could also be named "Phone to Home" and still be the same service. Wireguard and no real telephone. Or "Wireguard Dude" - still no dude.the name literally includes the word "home"
Hey if that comment is for me, I am actually trying to provide constructive improvements to the guides. It would better inform new persons and also enable the correct and smart rextended's of the world, to respond with please read MT documentation where it states x,y,z , although I prefer his sarcastic take downs :-)Looks like somebody has not read the manual. Please stop with the stupid trolling.
There was an incident, and it's "blame the user"? And that "home" in name means unreliability?the name literally includes the word "home"
It's likely best to do it phone BTH app - so you can test it first. But doing it via CLI, "/ip/cloud/set back-to-home-vpn=enabled" is identical, except your phone would not then have the first user.One only needs the APP to create the first user ( the smartphone itself ). It automatically turns on BTH VPN, and creates the first two entries!
I had thought one needed to manually turn on BTH VPN in ip cloud first.
Router running BTH gets the .1 address (i.e. the back-to-home WG interface), with the first peer getting .2 (with peer information in top-level /ip/cloud), then any "shared users" / n-th peers are number .3, .4, .5, ... (with the peer stored in /ip/cloud/back-to-home-users, or the same named button in winbox).1. When creating the the tunnel from the phone it would appear that two peers are created, the actual smartphone itself 192.168.216.3 and..........
a. the first peer, 192.168.216.2 appears to be the MT cloud relay peer reference and it has two entries I dont understand:
peer user, (ones smartphone), the dynamic client peer setting has two entries I dont understand.
Dunno exactly... But the lower it is the sooner BTH can re-calculate status. And, since OTHER devices's NAT might be involved, it ensure any OTHER NAT connection mapping do not get flushed and remained tracked.i. persistent keep alive of 5 seconds??
I can understand on the client device of having a persistent keep alive, what is the purpose of this one ???
I suppose the router needs to keep pinging the mt cloud server for some reason??
It's the IPv6 version of BTH fixed private IP range, so same as 192.168.216.2. And fc00::/8 is like 10.x.x.x,... private ranges for IPv6, so Mikrotik reuses some of the private/non-routable IPv6 for BTH use. But it ensure each peer always gets a fixed BTH IP address for IPv6 too, which you might want for any IPv6 routing over WG. The ::2, ::3 should follow same numbering as IPv4.ii. allowed address of: fc00:0:0:216::2/128
what does this actually mean, or translate to.
Is this so that the router accepts any traffic from the MT cloud bTH server and why doesnt the actual IP suffice ??
To be able to accept traffic from Mikrotik BTH proxy servers when proxied. And also the more "traditional" use when your router has a public IP. So needed BOTH proxied and direct modes.c. responder box is checked?
Why, on normal wireguard this is not utilized from what I recall??
What is the purpose of this being checked? ( on both the .2 (MT cloud peer) and .3, the iphone 1st master peer)
Because they don't want to have two places to manage BTH, and most dynamic entires (outside DHCP) work like this - i.e. you disable dynamic config via the other/actual config option that caused it to be enable. Since the WG peers got created by via /ip/cloud and /ip/cloud/back-to-home-users, that how they removed/changed too. Now nothing stops you from "copy" a BTH peer shown under /interface/wireguard/peer, and adding it as new one to make it static - although I haven't tested that.d. dynamic nature of peer?
Why cannot we make any of the peers peer static with one button selection...............
Correct. And it's also dynamic, so firewall rule is removed if BTH is disabled/"revoked" in /ip/cloud2. In terms of firewall rules, I see that the router automatically gets an input rule for wireguard, and assuming this covers the case if router does have a public IP and thus devices can talk directly to the router.
It's allowed since there [yet another] dynamic config item to add the back-to-home WG interface as a LAN interface-list (/interface/lists) - so the default firewall rule that allows LAN, allows BTH by default.3. Although LAN was checked for bth client access, I do not see any forward firewall rule allowing this????
IPv6 address are not required on the peers or router, although it will be generated in the sample/exported/shared config.1. Do I need to keep the IPV6 addresses, even though I am strictly using IPV4, in other words does MT relay server require that for all devices??
It be nice if the docs just wrote what is modified dynamically in configuration... Now I do NOT know the logic of when the dynamic config is "re-evaluated" - and potentially re-applied - so if you move around firewall rules IDK what happens...2. The dynamic firewall rules are flaky.
[...]
3. Assuming the allow LAN rule, which I havent actually seen yet, only block rule............
is basically non-existant as it relies on the default condition of forward chain which only blocks non dst-nattted traffic from WAN.
Thus if one constructs vlans for example one must add a forward chain rule to ensure BTH traffic reaches a specific subnet??
I dont see any allow bth to interface-list=LAN rule thats for sure.......
... so here should be two rules added dynamically by BTH:/ip/firewall/filter add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
And so it's first rule that will drop anyone in the /ip/firewall/address-list that want to reach any interface in the LAN /interface/list. And when you UN-check the "Allow LAN" box you're actually modifying /ip/firewall/address-list, not the filter rules directly./ip/firewall/filter/print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; back-to-home-vpn
chain=forward action=drop
src-address-list=back-to-home-lan-restricted-peers
out-interface-list=LAN
1 D ;;; back-to-home-vpn
chain=input action=accept protocol=udp dst-port=25297
While I get it... that would include doing a /system/reset-configuration no-defaults=no keep-users=yes IMO. And I bet everything would work. I doubt the docs assume anyone has custom firewall rules or VLANs in their docs... And merely disabling BTH may not fully cleanup things...I am trying to follow the MT documents.
rejected how? post screenshot. I can't repeat the issue@NORMIS, what is the trick of connecting to the router itself to create shares?? I can connect via VPN but after hitting manage shares, the login I provide (triple checked) and same one used to create the tunnel in the first place on the phone) is REJECTED ????????
/ip firewall filter
add action=accept chain=forward comment=Back-to-home_LAN in-interface=back-to-home-vpn
add action=accept chain=forward comment=Back-to-home_LAN out-interface=back-to-home-vpn
Seeing as you have persistent keep alive set to the relay server, the router keeps in contact with the relay server??Sorry for many questions, but just getting deeper into BTH.
Why and what traffic is coming in from the dynamic BTH interface that is added? I created BTH on the phone, all works. Then I switch the phone off and would assume no more traffic is coming in/accepted on the input chain. But not the case , the counter increments steadily without a BTH client out there.
So what traffic is this, mddns? I don't like an input chain accepting traffic on position 1 without knowing what that is.
IDK. And, could be neighbor discovery too.Seeing as you have persistent keep alive set to the relay server, the router keeps in contact with the relay server??Why and what traffic is coming in from the dynamic BTH interface that is added? [...] the counter increments steadily without a BTH client out there.
So what traffic is this, mddns?
As one can see 2nd rule opens completely port 16453 from any side (LAN/WAN) and any interface/port of the router.
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; back-to-home-vpn
chain=forward action=drop src-address-list=back-to-home-lan-restricted-peers out-interface-list=LAN
1 D ;;; back-to-home-vpn
chain=input action=accept protocol=udp dst-port=16453
Searched for "back-" in config and it added those valuesWell you need to ensure LAN is allowed on bth users ( its the default setting so should be )
You may need to add a forward chain allow rule from BTH to LAN
You may need to add a forward chain rule allow from BTH to WAN
/ip cloud set back-to-home-vpn=enabled ddns-enabled=yes ddns-update-interval=10m
/ip cloud back-to-home-users add allow-lan=yes comment="Xiaomi" name="MikroTik hAP AX3" private-key="xxx=" public-key="xxx"
/interface wireguard add comment=back-to-home-vpn disabled=yes listen-port=40556 mtu=1420 name=back-to-home-vpn private-key="xxxx"
Well , i did try only from Android mobile app, without any additional settings and except of Mikrotik router connection, nothing is workingLet me repeat it again. If you find BTH confusing, it's because you are trying to configure it from Winbox. You should not use Winbox or CLI for BTH at all.
Use the BTH app and it will be much clearer. Sure it's technically possible, but it is not made for that. If you are in Winbox, just use Wireguard.
I tried looking through the generated interfaces and wireguard config in the admin UI, but I am still new to mikrotik and could not find it on my own. Can someone point me in the right direction? :)my private Network uses 10.0.0.0/24 as address range. When I connect via BTH my device gets a 192.168.216.0/24 address.
This implies that requests needs routing, and I need to update some firewall rules.
Would it be possible that BTH users will just get a 10.0.0.0/24 address, as if they were "truly local"?
I cannot say I've run performance benchmarks*. But I'd imagine you should be able get 50Mb/s or more through the proxy connection, or I've seen in my limited test when proxied. And if it's running in "direct" mode (i.e. your router has a public IP), BTH is exactly same overhead as regular WireGuard - and limited by the internet speed/latency and router CPU.It‘s not about being able to reach the media (even DNS works fine). The question is about performance of routing between the different ip ranges for large amounts of data like 4k streams
I believe, in the app, if you want JUST the LAN (which let other network traffic go out wi-fi/lte)... you can use the ⋮ next to the connect, and "Edit", the allowed addresses to remove 0.0.0.0/0 and replace it with your LAN subnet(s). By default, all traffic goes through the BTH tunnel & if your using it just to stream, you may "save" bandwidth/CPU/etc if you allow all other traffic to use "real" Wi-Fi/LTE connection.Interesting, thanks!!
/ip firewall mangle
add action=change-mss chain=postrouting dst-address=192.168.216.0/24 log=yes new-mss=1358 protocol=tcp tcp-flags=syn tcp-mss=1359-65535
I did but checked today and the new supout didnt show, I must not have completed the add process properly.Send the RIF to support, thank you, there might be some cases where some default config is conflicting.
@anav, did they get back to you? Been following your saga here for a while on what should be a simple for someone as well-versed in WG.I did but checked today and the new supout didnt show, I must not have completed the add process properly.
Added it just now and its visible in the conversation trail.
Sounds like you have messed the allowed-ips setting, defining subnets too large. For single hosts you should always use "/32".What can cause an error is that to join a second peer I have to block it in Winbox then unlock it and the connection is just working. This operation also causes the previous peer to stop working - websites do not load, I cannot log in to the router.
You had right. It is works properly now. Thx!Sounds like you have messed the allowed-ips setting, defining subnets too large. For single hosts you should always use "/32".What can cause an error is that to join a second peer I have to block it in Winbox then unlock it and the connection is just working. This operation also causes the previous peer to stop working - websites do not load, I cannot log in to the router.
YES, the first response was they could not recreate, so then I decided to use my my main router for BTH 1009 and the same issue occurred, I added the new SUP but they seemed to have not looked at it so, no answer yet. I may repost a new bug report with the 1009 as the second supout seems to be ignored.@anav, did they get back to you? Been following your saga here for a while on what should be a simple for someone as well-versed in WG.I did but checked today and the new supout didnt show, I must not have completed the add process properly.
Added it just now and its visible in the conversation trail.