i'm not so much experienced in vlans yet.. so i have this problem:
When i try to ping from a vlan host to another, it just fails and gives me a "rejected" message. I can't even ping the vlan interface. No one pings no one under the same vlan.
It doesn't seem to be any of my firewall rules though.
Funny thing is that apart from this problem, everything else in this 3 vlan topology works as desired.
Here is my export:
Code: Select all
/interface bridge
add fast-forward=no name=bridge.vlans vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] name=ether1-WAN
set [ find default-name=ether2 ] name=ether2-v10-office
set [ find default-name=ether3 ] name=ether3-v10-office
set [ find default-name=ether4 ] name=ether4-v10-office
set [ find default-name=ether5 ] name=ether5-v10-office
set [ find default-name=ether6 ] name=ether6-MS
set [ find default-name=ether7 ] name=ether7-AP0
set [ find default-name=ether8 ] name=ether8-AP1
set [ find default-name=sfp1 ] disabled=yes
/interface vlan
add arp=proxy-arp interface=bridge.vlans name="vlan10 - office" vlan-id=10
add arp=proxy-arp interface=bridge.vlans name="vlan20 - class" vlan-id=20
add arp=proxy-arp interface=bridge.vlans name="vlan30 - guest" vlan-id=30
/interface list
add name=WAN
add name=Local.LANs
add name=Trusted.LAN
add name=Special.LANs
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/interface wireless
set [ find default-name=wlan1 ] antenna-gain=4 band=2ghz-onlyg comment=\
"Office" country=australia disabled=no distance=indoors \
frequency=2462 frequency-mode=regulatory-domain mode=ap-bridge \
security-profile=office ssid="Office" tx-power-mode=\
all-rates-fixed vlan-id=10 wireless-protocol=802.11 wps-mode=disabled
add comment="Guest" disabled=no keepalive-frames=disabled \
mac-address=6E:3B:6B:DF:45:35 master-interface=wlan1 multicast-buffering=\
disabled name=wlan2 security-profile=guest ssid="Guest" \
vlan-id=30 wds-cost-range=0 wds-default-cost=0 wps-mode=disabled
/ip pool
add name="pool - office" ranges=172.20.3.100-172.20.3.149
add name="pool - class" ranges=172.20.251.10-172.20.251.253
add name="pool - guest" ranges=172.20.250.10-172.20.250.253
/ip dhcp-server
add address-pool="pool - office" disabled=no interface="vlan10 - office" \
lease-time=1d name="dhcp - office"
add address-pool="pool - class" disabled=no interface="vlan20 - class" \
lease-time=1d name="dhcp - class"
add address-pool="pool - guest" disabled=no interface="vlan30 - guest" \
lease-time=1d name="dhcp - guest"
/interface bridge port
add bridge=bridge.vlans interface=ether2-v10-office pvid=10 trusted=yes
add bridge=bridge.vlans interface=ether3-v10-office pvid=10 trusted=yes
add bridge=bridge.vlans interface=ether4-v10-office pvid=10 trusted=yes
add bridge=bridge.vlans interface=ether5-v10-office pvid=10 trusted=yes
add bridge=bridge.vlans interface=wlan1 pvid=10 trusted=yes
add bridge=bridge.vlans interface=wlan2 pvid=30 trusted=yes
add bridge=bridge.vlans interface=ether6-MS trusted=yes
add bridge=bridge.vlans interface=ether8-AP1 trusted=yes
add bridge=bridge.vlans interface=ether7-AP0 trusted=yes
/interface bridge settings
set use-ip-firewall-for-vlan=yes
/interface bridge vlan
add bridge=bridge.vlans tagged=bridge.vlans,ether7-AP0,ether8-AP1,ether6-MS \
vlan-ids=10
add bridge=bridge.vlans tagged=bridge.vlans,ether6-MS vlan-ids=20
add bridge=bridge.vlans tagged=bridge.vlans,ether7-AP0,ether8-AP1 vlan-ids=30
/interface list member
add interface="vlan10 - office" list=Local.LANs
add interface=ether1-WAN list=WAN
add interface="vlan20 - class" list=Local.LANs
add interface="vlan30 - guest" list=Local.LANs
add interface="vlan10 - office" list=Trusted.LAN
add interface="vlan20 - class" list=Special.LANs
add interface="vlan30 - guest" list=Special.LANs
/ip address
add address=172.20.3.254/24 interface="vlan10 - office" network=172.20.3.0
add address=172.20.251.254/24 interface="vlan20 - class" network=172.20.251.0
add address=172.20.250.254/24 interface="vlan30 - guest" network=172.20.250.0
/ip dhcp-client
add dhcp-options=hostname,clientid disabled=no interface=ether1-WAN
/ip dhcp-server network
add address=172.20.3.0/24 dns-server=192.168.68.254 gateway=172.20.3.254
add address=172.20.250.0/24 dns-server=172.20.250.254 gateway=172.20.250.254
add address=172.20.251.0/24 dns-server=172.20.251.254 gateway=172.20.251.254
/ip dns
set allow-remote-requests=yes servers=192.168.68.1
/ip firewall filter
add action=accept chain=input comment=\
"Accept All Access From Router" src-address=*********
add action=accept chain=input comment="Accept PPTP VPN" dst-port=1723 \
protocol=tcp src-address=*********
add action=accept chain=input comment="Accept DNS Request to Router (UDP)" \
dst-port=53 in-interface-list=Local.LANs protocol=udp
add action=accept chain=input comment="Accept Inside Trusted Winbox Access" \
dst-port=35653 in-interface-list=Trusted.LAN protocol=tcp
add action=accept chain=input comment="Accept Inside Trusted Web Access" \
dst-port=7070 in-interface-list=Trusted.LAN protocol=tcp
add action=accept chain=input comment="Accept DHCP Requests" dst-port=67 \
in-interface-list=Trusted.LAN protocol=udp
add action=accept chain=input comment=\
"Allow Established & Related Connections to Router" connection-state=\
established,related
add action=drop chain=input comment="Drop All Others to Router"
add action=accept chain=forward comment=\
"Accept All Access From LAN" src-address=**********
add action=accept chain=forward comment="Accept NTP Requests from clients" \
dst-port=123 in-interface-list=Local.LANs out-interface-list=WAN \
protocol=udp
add action=accept chain=forward comment="Allow NTP Replies to clients" \
in-interface-list=Local.LANs out-interface-list=WAN protocol=udp \
src-port=123
add action=accept chain=forward comment=\
"Allow Established & Related Connections to clients" connection-state=\
established,related,new
add action=drop chain=forward comment="Drop All Other to LAN"
add action=accept chain=output comment="Allow all to Us" dst-address=\
******** out-interface-list=WAN
add action=accept chain=output comment=\
"Allow DNS Requests to Remote DNS servers (UDP)" dst-port=53 \
out-interface-list=WAN protocol=udp
add action=accept chain=output comment=\
"Allow DNS Requests to Remote DNS servers (TCP)" dst-port=53 \
out-interface-list=WAN protocol=tcp
add action=accept chain=output comment=\
"Allow Established & Related Connections" connection-state=\
established,related
add action=drop chain=output comment="Drop All Others from Router"
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1-WAN
add action=dst-nat chain=dstnat disabled=yes dst-address=********* \
in-interface="vlan10 - office" to-addresses=172.3.20.0/24
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=none
/tool mac-server ping
set enabled=no