I asked on Reddit but didn't get a good answer: https://www.reddit.com/r/mikrotik/comme ... ific_port/
I don't understand how I connect my bridge network to the Wireguard interface.
Any tips please?
[admin@MikroTik] /ip/route> print
Flags: D - DYNAMIC; A - ACTIVE; c - CONNECT, s - STATIC, d - DHCP, y - COPY; + - ECMP
Columns: DST-ADDRESS, GATEWAY, DISTANCE
# DST-ADDRESS GATEWAY D
0 As+ 0.0.0.0/0 wireguardUK 1
DAd+ 0.0.0.0/0 192.168.1.1 1
DAc 192.168.1.0/24 bridgeLocal 0
DAc 192.168.2.0/24 ukvpn 0
DAc 192.168.2.4/32 wireguardUK 0
[admin@MikroTik] /ip/route> /ip/firewall/
address-list calea connection filter layer7-protocol mangle nat raw service-port export
[admin@MikroTik] /ip/route> /ip/firewall/filter/print
Flags: X - disabled, I - invalid; D - dynamic
0 chain=forward action=accept in-interface=wireguardUK out-interface=ukvpn
Currently you are doing ECMP it looks like, which is doing load balancing where some traffic is going over your regular connection and some is going over wireguard UK but you don't have control over what traffic is using what.I'm still confused about how to set up the routing for the ukvpn bridge. When I attach a client, it doesn't seem to know to go via wireguardUK!
ukvpn is a bridge, just so that I can organise a dhcpd for connected devices on ether{4,5}Sorry, not sure what you are doing using a separate UK VPN?
One only needs wireguard and not some other VPN on top (too complicated for me, plus dont touch layer 7 with a ten foot pole))
I presume what you are trying to do is get the devices on ether4 and ether5 to go online through the wireguard VPN whereas everything else should go online the normal way. Is this correct? If so, you need to do policy routing, and those devices should not have IPs on the wireguard subnet but on a different subnet (ex. 192.168.3.0/24).ukvpn is a bridge, just so that I can organise a dhcpd for connected devices on ether{4,5}
Sorry bumping old topic... this is what I want to do also on my network.I presume what you are trying to do is get the devices on ether4 and ether5 to go online through the wireguard VPN whereas everything else should go online the normal way. Is this correct? If so, you need to do policy routing, and those devices should not have IPs on the wireguard subnet but on a different subnet (ex. 192.168.3.0/24).ukvpn is a bridge, just so that I can organise a dhcpd for connected devices on ether{4,5}
Me too.Sorry bumping old topic... this is what I want to do also on my network.
I presume what you are trying to do is get the devices on ether4 and ether5 to go online through the wireguard VPN whereas everything else should go online the normal way. Is this correct? If so, you need to do policy routing, and those devices should not have IPs on the wireguard subnet but on a different subnet (ex. 192.168.3.0/24).
May I know how to do that?
Thanks..
Exactly. You can't bridge a layer2 network directly into wireguard. Use a encapsulation Mechanism like VXLAN or EoIP and then route the traffic over the wireguard interfaces.In short, WireGuard does not work with Bridge-LAN. That's it?
......I presume what you are trying to do is get the devices on ether4 and ether5 to go online through the wireguard VPN whereas everything else should go online the normal way. Is this correct? If so, you need to do policy routing, and those devices should not have IPs on the wireguard subnet but on a different subnet (ex. 192.168.3.0/24).ukvpn is a bridge, just so that I can organise a dhcpd for connected devices on ether{4,5}