Is my understanding correct?
Thank you.Is my understanding correct?
Yes.
Of course you need corresponding config for ether1 under bridge/port and appropriate config of bridge port (but that's not subject of this topic, right?)
/interface bridge port add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=wifi1 pvid=32
/interface bridge port add bridge=bridge frame-types=admit-only-vlan-tagged interface=ether5
That's really great -- and very much appreciated.Yes. Just add the ingress-filtering=yes and you're golden.
It will check if ingress port is member of VLAN that ingressing frame belongs to."When ingresss-filtering=YES, port will actually look at VLAN ID of ingressing frame and will drop frames where VID is not one of port's VLANs (as configured under bridge/vlan)."
What parameter exactly in the bridge/vlan config is checked to see if a frame can ingress?
Why would a frame tagged with VID=32 ingressing to ether1 be accepted?It will check if ingress port is member of VLAN that ingressing frame belongs to."When ingresss-filtering=YES, port will actually look at VLAN ID of ingressing frame and will drop frames where VID is not one of port's VLANs (as configured under bridge/vlan)."
What parameter exactly in the bridge/vlan config is checked to see if a frame can ingress?
As per your example: on ether1 if ingressing frame is tagged with VID=32, then it'll be accepted. If, OTOH, ingressing frame is tagged with e.g. VID=666, then it will be dropped (because ether1 is not set as member of vlan 666).
In reality, a trunk port will be mentioned in several bridge/vlan configuration lines, hence multiple VIDs will be allowed on ingress of such port.
What??Why would a frame tagged with VID=32 ingressing to ether1 be accepted?
Why would a frame tagged with VID=32 ingressing to ether1 be accepted?
It will check if ingress port is member of VLAN that ingressing frame belongs to.
As per your example: on ether1 if ingressing frame is tagged with VID=32, then it'll be accepted. If, OTOH, ingressing frame is tagged with e.g. VID=666, then it will be dropped (because ether1 is not set as member of vlan 666).
In reality, a trunk port will be mentioned in several bridge/vlan configuration lines, hence multiple VIDs will be allowed on ingress of such port.
Do you mean any of these ports: bridge,sfp-sfpplus1,ether4,ether5?
The example we were using was:What??Why would a frame tagged with VID=32 ingressing to ether1 be accepted?
Well the physical port ether1 is a trunk port carrying multiple vlans to the local device.
Why would you not think that vlan32 should be allowed to ingress in ether1??
A. its on the trunk port leaving the upstream device.
B. its noted as a tagged vlan id on ether1 in /interface bridge vlan settings.
If there was also a port on the device untagged for vlan32, lets say connected to a PC, how do you think the PC gets an IP address and traffic out to the ethernet by willpower ???
The example we were using was:
What??
Well the physical port ether1 is a trunk port carrying multiple vlans to the local device.
Why would you not think that vlan32 should be allowed to ingress in ether1??
A. its on the trunk port leaving the upstream device.
B. its noted as a tagged vlan id on ether1 in /interface bridge vlan settings.
If there was also a port on the device untagged for vlan32, lets say connected to a PC, how do you think the PC gets an IP address and traffic out to the ethernet by willpower ???
[code}add bridge=bridge tagged=bridge,sfp-sfpplus1,ether4,ether5 untagged=ether6,ether7 vlan-ids=32[/code]
I think you were referring back to the first post in this thread.
Great!
The example we were using was:
[code}add bridge=bridge tagged=bridge,sfp-sfpplus1,ether4,ether5 untagged=ether6,ether7 vlan-ids=32[/code]
I think you were referring back to the first post in this thread.
In this case vlan32 travels within the router or switch as tagged between all ports associated with the vlan id, sfp-sfpplus1, ether4,ether5,ether6 and ether7.
Upon traffic exiting the ports, the vlan tags stay on the traffic for sfp-sfpplus1,ether4,ether5 being trunk ports ( or vice versa traffic entering these ports).
Upon traffic physically the device on etherports 6,7 the vlan-ids are stripped off, and when traffic arrives at the port from an external device, the vlan tags are added.
/interface bridge
add admin-mac=F4:1E:57:2C:BE:98 auto-mac=no comment=defconf frame-types=\
admit-only-vlan-tagged name=bridge vlan-filtering=yes
/interface vlan
add comment=vlan32 interface=ether1 name=vlan32 vlan-id=32
/interface bridge port
add bridge=bridge comment="vlan32 MGMT" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether2 pvid=32
add bridge=bridge comment="vlan42 TV " frame-types=\
admit-only-untagged-and-priority-tagged interface=ether3 pvid=42
add bridge=bridge comment="vlan62 Server" frame-types=admit-only-vlan-tagged \
interface=ether4 pvid=62
add bridge=bridge comment=defconf interface=wifi1
add bridge=bridge comment=defconf interface=wifi2
add bridge=bridge interface=ether1
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged \
interface=ax3-vlan-iot pvid=12
add bridge=bridge comment=VLAN2 frame-types=\
admit-only-untagged-and-priority-tagged interface=ax3-2g-vlan pvid=2
add bridge=bridge comment=VLAN2 frame-types=\
admit-only-untagged-and-priority-tagged interface=ax3-5g-vlan pvid=2
/interface bridge vlan
add bridge=bridge tagged=bridge,ether1 vlan-ids=32
It should be interface=bridge ... it took me 0 seconds (recognized it while reading config)./interface vlan
add comment=vlan32 interface=ether1 name=vlan32 vlan-id=32
We have a winner!This one:
It should be interface=bridge ... it took me 0 seconds (recognized it while reading config)./interface vlan
add comment=vlan32 interface=ether1 name=vlan32 vlan-id=32
I don't understand where you are quoting from?Speed is not all its cracked up to be, taking ones time mostly results in greater satisfaction,..........
Besides there is an error before that..... and many many after LOL
1. /interface bridge
add admin-mac=F4:1E:57:2C:BE:98 auto-mac=no comment=defconf frame-types=\
admit-only-vlan-tagged name=bridge vlan-filtering=yes
2. /ip bridge port
add bridge=bridge comment="vlan62 Server" frame-types=admit-only-vlan-tagged \
interface=ether4 pvid=62
3. /ip bridge port
add bridge=bridge comment=defconf interface=wifi1 -----> frame types PVID??????
add bridge=bridge comment=defconf interface=wifi2 -----> frame types PVID??????
add bridge=bridge interface=ether1 ---> frame types????
4. Horrible nomenclature or plain wrong?, it seems to state to the reader we are untagging frames exiting a vlan vice exiting a port???
Did you actually name a port ax3-vlan-iot or did you think that a vlan is a port???
/ip bridge port
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged \
interface=ax3-vlan-iot pvid=12
5. Looks like you made the same mistake two more time........
add bridge=bridge comment=VLAN2 frame-types=\
admit-only-untagged-and-priority-tagged interface=ax3-2g-vlan pvid=2
add bridge=bridge comment=VLAN2 frame-types=\
admit-only-untagged-and-priority-tagged interface=ax3-5g-vlan pvid=2
Luckily there is no more config supplied to eviscerate.![]()
My thinking on the interface name is to have it match the SSID. The reason why I chose ax3-vlan-iot, ax3-2g-vlan, and ax3-5g-vlan is to match the SSIDs of those wifi interfaces so that when I connect to them I can be certain I am connecting to the vlan-enabled wifi networks.The first error.
1. is quoting from your config in post #18 and is WRONG ( do not use the bridge itself to set frames )
2. is quoting from your confing in post #18 and is WRONG. Your contradicting yourself, as plain as day, how can you say its a vlan tagged frames, when you have a PVID????
3. Missing frame types and pvids
4. Then its horrible nomenclature and does nothing but confuse the reader, STATE THE PORT NUMBER and dont mention vlan !!
aka
/ip bridge port
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged \
interface=ether4-iot pvid=12
When I read that line, I immediately read that as an access port on ether4 associated with vlan12 and a dumb IOT device attached to the port.
Same for the wireless ports!!
add bridge=bridge comment=VLAN2 frame-types=\
admit-only-untagged-and-priority-tagged interface=wifi1-2g-home pvid=2
add bridge=bridge comment=VLAN2 frame-types=\
admit-only-untagged-and-priority-tagged interface=wifi2-5g-home pvid=2
The first error.
1. is quoting from your config in post #18 and is WRONG ( do not use the bridge itself to set frames )
This is a great approach and a great explanation.The first error.
1. is quoting from your config in post #18 and is WRONG ( do not use the bridge itself to set frames )
IMHO if OP has a VLAN-only configuration, with no IP address configured on the interface "bridge", then setting frame-types=admit-only-vlan-tagged is the correct way, and it's also what I usually do on my routers:
bridge-vlan-frame-types.png
Here we configure the frame types parameter for the CPU bridge port. If we keep the default "admit-all" setting and enable VLAN Filtering, current RouterOS versions automatically add a dynamic entry for VLAN 1 in the /interface bridge vlan table, with the CPU port listed under Current Untagged. We have no use for VLAN 1, that dynamic entry is useless.
If we think more about it, on the router, in a VLAN-only configuration, the CPU port only appears in the "tagged ports" list of the VLANs (and only for VLANs that the main CPU needs access to). The CPU port is effectively a trunk port. That's why frame-types=admit-only-vlan-tagged is the perfect and correct setting for it. Doing it so also gets rid of the dynamic entry for VLAN 1 in the /interface bridge vlan table.
/interface bridge
add admin-mac=F4:1E:57:2C:BE:98 auto-mac=no comment=defconf frame-types=admit-only-vlan-tagged name=bridge vlan-filtering=yes
/interface wifi
set [ find default-name=wifi1 ] channel.band=5ghz-ax .skip-dfs-channels=all .width=20/40/80mhz configuration.mode=ap .ssid=ax3-5g-test disabled=no \
security.authentication-types=wpa2-psk .ft=yes .ft-over-ds=yes
set [ find default-name=wifi2 ] channel.band=2ghz-ax .skip-dfs-channels=all .width=20/40mhz configuration.mode=ap .ssid=ax3-2g-test disabled=no \
security.authentication-types=wpa2-psk .ft=yes .ft-over-ds=yes
/interface vlan
add comment=vlan32 interface=bridge name=vlan32 vlan-id=32
/interface wifi
add configuration.mode=ap .ssid=ax3-2g-vlan disabled=no mac-address=F6:1E:57:2C:BE:9D master-interface=wifi2 mtu=1500 name=ax3-2g-vlan security.authentication-types=\
wpa2-psk
add configuration.mode=ap .ssid=ax3-5g-vlan disabled=no mac-address=F6:1E:57:2C:BE:9C master-interface=wifi1 name=ax3-5g-vlan security.authentication-types=wpa2-psk
add configuration.mode=ap .ssid=ax3-vlan-iot disabled=no mac-address=F6:1E:57:2C:BE:9E master-interface=wifi2 name=ax3-vlan-iot security.authentication-types=wpa2-psk
/interface bridge port
add bridge=bridge comment="vlan32 MGMT" frame-types=admit-only-untagged-and-priority-tagged interface=ether2 pvid=32
add bridge=bridge comment="vlan42 TV " frame-types=admit-only-untagged-and-priority-tagged interface=ether3 pvid=42
add bridge=bridge comment="vlan62 Server" frame-types=admit-only-untagged-and-priority-tagged interface=ether4 pvid=62
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged interface=wifi1 pvid=32
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged interface=wifi2 pvid=32
add bridge=bridge frame-types=admit-only-vlan-tagged interface=ether1
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ax3-vlan-iot pvid=12
add bridge=bridge comment=VLAN2 frame-types=admit-only-untagged-and-priority-tagged interface=ax3-2g-vlan pvid=2
add bridge=bridge comment=VLAN2 frame-types=admit-only-untagged-and-priority-tagged interface=ax3-5g-vlan pvid=2
/interface bridge vlan
add bridge=bridge tagged=bridge,ether1 vlan-ids=32