Pretty straightforward network setup. Used for home.
RB450G
Interface 1 - WAN - Cable Modem
Interface 2 - DMZ
Interface 3 - WLAN - external AP running DD-WRT
Interface 4 - LAN (slave to interface 5)
Interface 5 - LAN
Not sure I want to bore you with a ton of rules but it's basically the Dmitry on Firewalling
http://wiki.mikrotik.com/wiki/Dmitry_on_firewalling setup with some additional rules for viruses. So connections get marked first, everything is proxied.
PIM & IGMP on the LAN and WLAN interfaces with the RB450G as the RP.
Here are some rule snippets to give you an idea of what I'm doing. I've removed some of the filtering between WLAN and LAN in this example. I was thinking that one of the advantages of the bridge would be that Bonjour and multicast/broadcast would get passed by default and that something I've been struggling with.
add action=accept chain=forward comment="Allow all traffic FROM wired to wireless network" disabled=no in-interface=ether5_lan out-interface=ether3_wifi
add action=accept chain=forward comment="Allow traffic between wired and wireless networks" disabled=no in-interface=ether3_wifi out-interface=ether5_lan
add action=jump chain=sanity-check comment="Drop illegal destination addresses" disabled=no dst-address-list=illegal-addr dst-address-type=!local in-interface=ether5_lan jump-target=drop_sanity
add action=jump chain=sanity-check comment="Drop illegal destination addresses" disabled=no dst-address-list=illegal-addr dst-address-type=!local in-interface=ether3_wifi jump-target=drop_sanity
add action=jump chain=sanity-check comment="Drop everything that goes from local interface but not from local address" disabled=no in-interface=ether5_lan jump-target=drop_sanity src-address-list=!local-addr
add action=jump chain=sanity-check comment="Drop everything that goes from local interface but not from local address" disabled=no in-interface=ether3_wifi jump-target=drop_sanity src-address-list=!local-addr
add action=jump chain=input comment="DHCP protocol would not pass sanity checking, so enabling it explicitly before other checks" disabled=no dst-port=67 in-interface=ether5_lan jump-target=dhcp protocol=udp src-port=68
add action=jump chain=input comment="DHCP protocol would not pass sanity checking, so enabling it explicitly before other checks" disabled=no dst-port=67 in-interface=ether3_wifi jump-target=dhcp protocol=udp src-port=68
add action=accept chain=input comment="" disabled=no dst-address-type=broadcast,multicast in-interface=ether3_wifi protocol=igmp
add action=accept chain=input comment="" disabled=no dst-address-type=broadcast,multicast in-interface=ether5_lan protocol=igmp
add action=accept chain=input comment="" disabled=no dst-address-type=broadcast,multicast in-interface=ether3_wifi protocol=udp
add action=accept chain=input comment="" disabled=no dst-address-type=broadcast,multicast in-interface=ether5_lan protocol=udp
add action=jump chain=input comment="Allowing some services to be accessible from the local network" disabled=no in-interface=ether5_lan jump-target=local-services
add action=jump chain=input comment="Allowing some services to be accessible from the wifi network" disabled=no in-interface=ether3_wifi jump-target=wifi-services
add action=jump chain=input comment="Allowing some services to be accessible from the Internet" disabled=no in-interface=ether1_wan jump-target=public-services
add action=accept chain=local-services comment="SSH (22/TCP)" connection-mark=ssh disabled=no
add action=accept chain=local-services comment=DNS connection-mark=dns disabled=no
add action=accept chain=local-services comment="HTTP Proxy " connection-mark=proxy disabled=no
add action=accept chain=local-services comment="Allow vista icm udp to 3947 so the logs don't get filled" connection-mark=vista_icm disabled=no
add action=accept chain=local-services comment="Accept NTP/123" connection-mark=ntp disabled=no
add action=accept chain=local-services comment="Winbox (8291/TCP)" connection-mark=winbox disabled=no
add action=accept chain=local-services comment="accept mikrotik dude " connection-mark=dude disabled=no
add action=jump chain=local-services comment="drop all other local services" disabled=no jump-target=drop_local_services
add action=accept chain=wifi-services comment="SSH (22/TCP)" connection-mark=ssh disabled=yes
add action=accept chain=wifi-services comment="Accept NTP/123" connection-mark=ntp disabled=no
add action=accept chain=wifi-services comment=DNS connection-mark=dns disabled=no
add action=accept chain=wifi-services comment="HTTP Proxy " connection-mark=proxy disabled=no
add action=accept chain=wifi-services comment="Accept EoIP" connection-mark=EoIP disabled=yes
add action=accept chain=wifi-services comment="Winbox (8291/TCP)" connection-mark=winbox disabled=yes
add action=jump chain=wifi-services comment="drop all other wifi services" disabled=no jump-target=drop_wifi_services
add action=accept chain=public-services comment="SSH (22/TCP)" connection-mark=ssh disabled=yes
add action=accept chain=public-services comment="PPTP (1723/TCP)" connection-mark=pptp disabled=yes
add action=accept chain=public-services comment="Winbox (8291/TCP)" connection-mark=winbox disabled=yes
add action=accept chain=public-services comment="GRE for PPTP" connection-mark=gre disabled=yes
add action=jump chain=public-services comment="" disabled=no jump-target=drop_public_services