Last active
April 30, 2023 13:20
-
-
Save yradunchev/2dd505e19a5cc6fb29a390a9b13fe80a to your computer and use it in GitHub Desktop.
Revisions
-
yradunchev revised this gist
Apr 30, 2023 . 1 changed file with 4 additions and 4 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -4,19 +4,19 @@ endpoint-port=51820 interface=vpn persistent-keepalive=25s \ public-key="<replace_with_endpoint_public_key>" /ip address \ add address=<replace_with_vpn_client_address> interface=vpn network=<replace_with_vpn_client_address> /ip firewall nat \ add action=masquerade chain=srcnat out-interface=vpn /routing table add name=wg-vpn fib /ip firewall mangle \ add action=mark-routing chain=prerouting comment="Device based VPN" \ new-routing-mark=wg-vpn passthrough=yes src-address-list=device-based-vpn /ip firewall address-list \ add address=192.168.88.72 list=device-based-vpn /ip route -
yradunchev created this gist
Apr 30, 2023 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,25 @@ /interface wireguard add listen-port=51820 mtu=1420 name=vpn /interface wireguard peers add allowed-address=0.0.0.0/0 comment=vpn-peer endpoint-address=<replace_with_vpn_server_ip> \ endpoint-port=51820 interface=vpn persistent-keepalive=25s \ public-key="<replace_with_endpoint_public_key>" /ip address add address=<replace_with_vpn_client_address> interface=vpn network=<replace_with_vpn_client_address> /ip firewall nat add action=masquerade chain=srcnat out-interface=vpn /routing table add name=wg-vpn fib /ip firewall mangle add action=mark-routing chain=prerouting comment="Device based VPN" \ new-routing-mark=wg-vpn passthrough=yes src-address-list=device-based-vpn /ip firewall address-list add address=192.168.88.72 list=device-based-vpn /ip route add check-gateway=none comment="wg-vpn mark" disabled=no distance=10 \ dst-address=0.0.0.0/0 gateway=vpn pref-src="" routing-table=wg-vpn \ scope=30 suppress-hw-offload=no target-scope=10