

In the WireGuard-config generator click on generate key, then chose a country, city and server from the three drop down fields in section 3. Open the config file in a text editor and jump to 1.3) WireGuard peer setup. Platform and DNS Server (section 1 and 4) don't matter to us right now so we leave them as default, when done hit Download file at the bottom. Lastly, chose a country, city and server from the three drop down fields in section 3. When it is correctly pasted the key list should show the interface's public key. In the WireGuard-config generator extend the Manage keys section and past the private key into the bottom field, then click Import key. In this example it would be gF+iGVw1T/njKC2+AE8kZeQ/3/0gNAe6YumPQwMFhXY=

Public-key="Pvxe8aXKmdLIzd5u7u62PDSoQezy6XtIzteCD5w06Xw="įrom the output copy the private-key= value for the mullvad interface. In the RouterOS terminal enter > /interface/WireGuard/print detailĠ R name="mullvad" mtu=1420 listen-port=38044 private-key="gF+iGVw1T/njKC2+AE8kZeQ/3/0gNAe6YumPQwMFhXY="

There we need to either 1.1) Upload our key, or 1.2) Mullvad generates a key for us. Then open the WireGuard-config generator. In the RouterOS terminal enter /interface/WireGuard/add name=mullvad If you are using RouterOS 7.2 or later read my other post first! 1) Interface Configurationįirst, we need a WireGuard interface. So in this post I will explain how I setup my Mikrotik CHR to use Mullvad VPN with WireGuard, implement a kill-switch and use the Mullvad DNS. When looking through the VPN services GL iNet suggests, I stuck with Mullvad. After getting a GL iNet travel router and Mikrotik releasing RouterOS 7 I thought it's time to look at a 24/7 VPN connection again.
