WireGuard is a relatively new protocol. It claims to be greatly simplified and faster comparing to alternatives, it uses UDP as primary transport and encapsulates encrypted traffic from IP layer. Let's investigate if it's true!
Some differences help to stand out of other VPN solutions:
I was able to connect Mikrotik, FrtizBox 6690, macos, iPad and iPhone using WireGuard with little efforts.
Virtual Network Interface. Peers configuration. Private key.
WireGuard uses the table of peers of the folliwing structure
It can be even just a single host, or the whole subnet
The peer is either single client or router for the subnet
You don't distribute this part. Private key is used to decrypt traffic that was encrypted using public key. Therefore we put public key as a part of configuration to every distributable peer config.
In order to understand how to create config, let's try to understand what happends on the interface.
So it becomes apparent what to do.
Configuration for client should contain server public key. Configuration for server should contain client public key.
Mikrotik is supported from version 7 of RouterOS.