# This will also automatically create a route for 192.168.98.0/24 /ip address add address=192.168.98.1/24 interface=wireguard1 network=192.168.98.0 # Allow incoming traffic to the wireguard service /ip firewall filter add action=accept chain=input dst-port=13231 protocol=udp Client configuration # 0 R name="wireguard1" mtu=1420 listen-port=13231 private-key="example-mikrotik-private-key" public-key="example-mikrotik-public-key" # Allocate an IP address to the wireguard interface. # Create the wireguard interface, and generate the pub/pri keys /interface wireguard add listen-port=13231 mtu=1420 name=wireguard1 # Print the newly created interface - mark the public-key for later /interface wireguard print # Returns, e.g. We’re going to create a network interface for WireGuard, which will be assigned the IP 192.168.98.1, and we’ll dedicate 192.168.98.0/24 for the remote clients. Creating and configuring the WireGuard interface An ISP-provided router terminates the (PPPoA) DSL connection, and NATs 1:1 its public interface (1.2.3.4) to the WAN interface of the hAP (192.168.0.2), which through the LAN interface (192.168.1.1) masquerades all traffic going towards WAN.
0 Comments
Leave a Reply. |