opkpt.blogg.se

Mikrotik routeros v7
Mikrotik routeros v7





mikrotik routeros v7

Now we'll use those public keys and create WireGuard "peers" that point to the opposite device.

mikrotik routeros v7

Then add 10.0.1.2/24 to the WireGuard interface on the East router: ip/address add address=10.0.1.2/24 interface=East On the West router, add address 10.0.1.1/24: ip/address add address=10.0.1.1/24 interface=West We'll use these IPs to route traffic between the sites using static routes, OSPF, iBGP, etc. Let's add IP addresses to those new virtual WireGuard interfaces before going any further.

mikrotik routeros v7

We can see the certificates on the West router: > interface/wireguard/printĠ R name="West" mtu=1420 listen-port=13231 private-key="uEUUufex2/C36952pAj2+8Vq2/Z3Ovf+g59QoYTYbEg=" public-key="JXx83B44YTdZXgUyBgkoJHqGEt3ZO5Mra61C+EW1XXk="Īnd on the East router as well: > interface/wireguard/printĠ R name="East" mtu=1420 listen-port=13231 private-key="SP5dLklX/7dRrfEmequW+bJVisAx4ajMF/VzdYHv30U=" public-key="0tcvcpdup2e8MTJhPyzK7F/USrKjnJbzCfQKGI7VlwA=" We want to securely connect these routers so their respective 10.X/8 LANs can communicate.įirst, we'll create a WireGuard interface on the West router: interface/wireguard/add name=West comment="West WireGuard" listen-port=13231Īnd then on the East router: interface/wireguard/add name=East comment="East WireGuard" listen-port=13231Ĭreating the interface automatically generates public and private keys for encrypting the connection between devices. Two routers - one West and the other East - both with a public IP address and an internet connection.







Mikrotik routeros v7