<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Архивы RouterOS - Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</title>
	<atom:link href="https://boxvirt.com/tag/routeros/feed/" rel="self" type="application/rss+xml" />
	<link>https://boxvirt.com/tag/routeros/</link>
	<description>Practical self-hosted infrastructure guides for Proxmox, OPNsense, and Docker.</description>
	<lastBuildDate>Sat, 02 Aug 2025 20:51:58 +0000</lastBuildDate>
	<language>ru-RU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://boxvirt.com/wp-content/uploads/2025/07/cropped-ChatGPT-Image-12-июл.-2025-г.-19_41_55-32x32.png</url>
	<title>Архивы RouterOS - Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</title>
	<link>https://boxvirt.com/tag/routeros/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Set Up WireGuard VPN on MikroTik — Real-World Guide (2025)</title>
		<link>https://boxvirt.com/how-to-set-up-wireguard-vpn-on-mikrotik-real-world-guide-2025/</link>
					<comments>https://boxvirt.com/how-to-set-up-wireguard-vpn-on-mikrotik-real-world-guide-2025/#respond</comments>
		
		<dc:creator><![CDATA[eXtre]]></dc:creator>
		<pubDate>Sat, 02 Aug 2025 20:51:56 +0000</pubDate>
				<category><![CDATA[Mikrotik]]></category>
		<category><![CDATA[MikroTik]]></category>
		<category><![CDATA[RouterOS]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Winbox]]></category>
		<category><![CDATA[WireGuard]]></category>
		<guid isPermaLink="false">https://boxvirt.com/?p=105</guid>

					<description><![CDATA[<p>Want to connect to your home network from anywhere? Or route all your MikroTik traffic through a VPS with a static IP? Then WireGuard is your best friend. [&#8230;]</p>
<p>Сообщение <a href="https://boxvirt.com/how-to-set-up-wireguard-vpn-on-mikrotik-real-world-guide-2025/">How to Set Up WireGuard VPN on MikroTik — Real-World Guide (2025)</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>Want to connect to your home network from anywhere? Or route all your MikroTik traffic through a VPS with a static IP? Then <strong>WireGuard</strong> is your best friend. Here&#8217;s how I personally set it up — step-by-step, no fluff, no jargon.</p>
</blockquote>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Why WireGuard?</h2>



<p>WireGuard is a modern VPN protocol. It’s fast, lightweight, and refreshingly simple — no certificates, no massive config files. Just a few keys, IPs, and you&#8217;re good to go. If you&#8217;re on RouterOS 7+, you&#8217;re ready.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f9f0.png" alt="🧰" class="wp-smiley" style="height: 1em; max-height: 1em;" /> What You’ll Need</h2>



<ul class="wp-block-list">
<li>A MikroTik router running <strong>RouterOS 7.1+</strong></li>



<li>Access to <strong>Winbox</strong> or the <strong>terminal</strong></li>



<li>A basic idea of who’s the server and who’s the client</li>



<li>A few minutes (and maybe a coffee <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2615.png" alt="☕" class="wp-smiley" style="height: 1em; max-height: 1em;" />)</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f50c.png" alt="🔌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Step 1: Create the WireGuard Interface</h2>



<ol class="wp-block-list">
<li>Open <strong>Winbox → Interfaces → WireGuard</strong></li>



<li>Click the <code>+</code> and name your interface something like <code>wg0</code></li>



<li>Choose a <strong>port</strong>, like <code>13231</code></li>



<li>Generate a keypair using the terminal:</li>
</ol>



<pre class="wp-block-preformatted"><code>/interface wireguard key print<br></code></pre>



<p>Save both <strong>Private</strong> and <strong>Public</strong> keys somewhere safe.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f91d.png" alt="🤝" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Step 2: Add the Peer (the other side)</h2>



<ol class="wp-block-list">
<li>Go to <strong>WireGuard → Peers</strong></li>



<li>Add a new peer:
<ul class="wp-block-list">
<li><strong>Public Key</strong> from the other side (your client or VPS)</li>



<li><strong>Allowed Address</strong>: e.g., <code>192.168.100.2/32</code></li>



<li><strong>Endpoint</strong>: optional if you’re not the client</li>



<li><strong>Persistent Keepalive</strong>: <code>25s</code> if the peer is behind NAT</li>
</ul>
</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f9fe.png" alt="🧾" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Step 3: Assign an IP Address to wg0</h2>



<p>Go to <strong>IP → Addresses</strong>, click <code>+</code>:</p>



<ul class="wp-block-list">
<li>Address: <code>192.168.100.1/24</code></li>



<li>Interface: <code>wg0</code></li>
</ul>



<p>That’s the MikroTik&#8217;s IP inside the VPN tunnel. Your client might be <code>192.168.100.2</code>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f6e3.png" alt="🛣" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Step 4: Add a Route (If Needed)</h2>



<p>If you&#8217;re connecting two networks (site-to-site), you&#8217;ll need to add a static route:</p>



<pre class="wp-block-preformatted"><code>/ip route add dst-address=192.168.200.0/24 gateway=192.168.100.2<br></code></pre>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f525.png" alt="🔥" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Step 5: Add Firewall Rules</h2>



<p>Let’s make sure traffic is allowed:</p>



<pre class="wp-block-preformatted"><code>/ip firewall filter add chain=input protocol=udp dst-port=13231 action=accept<br>/ip firewall filter add chain=forward src-address=192.168.100.0/24 action=accept<br></code></pre>



<p>Optional: lock down your WAN completely (for extra paranoia):</p>



<pre class="wp-block-preformatted"><code>/ip firewall filter add chain=input in-interface=ether1 connection-state=new action=drop<br></code></pre>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f5a5.png" alt="🖥" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Step 6: Client Configuration (Linux Example)</h2>



<pre class="wp-block-preformatted"><code>[Interface]<br>PrivateKey = &lt;your-client-private-key><br>Address = 192.168.100.2/24<br><br>[Peer]<br>PublicKey = &lt;mikrotik-public-key><br>Endpoint = your.domain.com:13231<br>AllowedIPs = 0.0.0.0/0<br>PersistentKeepalive = 25<br></code></pre>



<p>It’s the same on Windows — just paste it into the WireGuard GUI.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f9ea.png" alt="🧪" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Step 7: Test It</h2>



<ul class="wp-block-list">
<li>Ping <code>192.168.100.1</code> from the client</li>



<li>In <strong>Winbox</strong>, check <strong>Interface → WireGuard</strong> — you should see traffic</li>



<li>Still not working? Read below <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2b07.png" alt="⬇" class="wp-smiley" style="height: 1em; max-height: 1em;" /></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f9ef.png" alt="🧯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Common Issues (and Fixes)</h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Problem</th><th>Fix</th></tr></thead><tbody><tr><td>Nothing connects</td><td>Double-check the public/private keys</td></tr><tr><td>One-way ping</td><td>You&#8217;re missing a route</td></tr><tr><td>Tunnel doesn&#8217;t come up</td><td>Check firewall or port forwarding (especially if MikroTik is behind NAT)</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Summary</h2>



<p>So far, you’ve:</p>



<ul class="wp-block-list">
<li>Set up a working WireGuard VPN on MikroTik</li>



<li>Secured communication between two points</li>



<li>Opened the door to advanced use cases — static IP via VPS, remote access, multi-site routing</li>
</ul>
<p>Сообщение <a href="https://boxvirt.com/how-to-set-up-wireguard-vpn-on-mikrotik-real-world-guide-2025/">How to Set Up WireGuard VPN on MikroTik — Real-World Guide (2025)</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://boxvirt.com/how-to-set-up-wireguard-vpn-on-mikrotik-real-world-guide-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
