MikroTik routers are very flexible but are sometime complex to configure. FRITZ!Box routers take a different approach and have a simpler interface with wizards to setup connections.
FRITZ!Box routers use IKEv1 aggressive mode for IPSEC VPNs which can cause some interoperability challenges when connecting to another vendor's device. WireGuard VPNs are relatively easy to setup if you have different brands of devices or if you to deal with dynamic IP addresses.
Although FRITZ!Box routers use configuration files for WireGuard, it's possible to create a connection to a MikroTik device. You will need RouterOS v7 for this, as WireGuard is not available in v6. For the FRITZ!Box use FRITZ!OS 7.50 or later. Both vendors have their own dynamic DNS services which is useful if you don't have static IPs.
In this example, 192.168.7.0/24 is the FRITZ!Box network and 192.168.4.0/24 is the MiktroTik network.
- Create a new WireGuard interface on the MikroTik. Set the MTU to 1412 (It appears the FRITZ!Box uses this, 40 byte for WireGuard with IPv6 + 8 byte PPPoE).
- Don't set any IP address on the new WireGuard interface. Instead, add an IP route to the remote FRITZ!Box subnet and set the WireGuard interface as the gateway.
- Add IPv4/IPv6 firewall rules to allow input UDP traffic on the chosen WireGuard port from the WAN along with any appropriate LAN <->VPN access via the new WireGuard interface.
- Add a mangle rule to limit the MSS to 1352 on traffic to/from the new WireGuard interface.
- On the FRITZ!Box, add a new WireGuard connection (Internet -> Permit Access -> WireGuard VPN).
No comments:
Post a Comment