Thu May 18, 2017 9:56 pm
Here's the difference between your examples:
In the first example, the vlan interfaces being on the bridge means that The Mikrotik will place tagged frames onto the bridge which will forward them as tagged ethernet to any ports (interfaces) connected to the bridge. For example, say that you put IP address 192.168.50.1/24 onto interface vlan50 and put interface vlan50 onto bridge1. Bridge1 has interfaces ether1 - ether5 connected to it as ports. What this means is that whenever you try to ping something in the 50.x network, the ping will go out interface vlan50, which puts an 802.1q vlan header with tag = 50. This tagged ethernet frame will be able to go to any device connected to any of the 5 physical interfaces. NOTE: The devices attached to these interfaces must be able to understand the vlan tag.
Then there's your other case:
If you put interface vlan50 directly on ether1, then this means that the tagged frames will be sent directly out on ether1, and none of the other bridge ports will be able to access vlan 50. In fact, I'd say that it's bad practice to put vlan interfaces onto physical etherX interfaces which are also connected to bridges. This second method is more like a standard router, basically. So if you have a single vlan-aware switch, you would just put the vlanXX interfaces directly onto ether1, and connect ether1 to the switch. The switch's port which is connected to the router must be configured to accept tagged traffic (Cisco switches refer to these as "trunks" - i.e. "switchport mode trunk").
If you have multiple vlan-aware switches, and wish to use the Mikrotik as your root switch, this is the scenario where you would bridge the ports and put the vlan interfaces onto the bridge.
A third, more complicated but flexible method is to create one bridge per VLAN in the Mikrotik. So suppose you want vlan50 to be on ports ether1 and ether2, but you want vlan60 to be on ports ether2 and ether3 - you would make some vlan interfaces: e1v50, e2v50, e2v60, and e3v60. Then you would make two bridges "bridge50" and "bridge60" - for the ports on this bridge, you would not connect the physical interfaces ether1, etc - you would connect the vlan interfaces instead. So you would then add e1v50 and e2v50 to bridge50, and you would add e2v60 and e3v60 to bridge60.
When you just put the vlan interfaces onto a single bridge and connect the physical ports to the bridge, this means that all interfaces will carry all vlans. You can then limit vlans to certain ports using bridge firewall rules, but I think this would much less efficient than the above method of bridging the vlan interfaces directly.