The fun part - i made a periodical http request from ESP32 to ESP8266, like every minute. And it works. I've checked on downtime the bridge/hosts - ESP32 MAC present.
My head gonna explode. I dont understand what da hell happening. Why esp32, why not esp8266?
dhcp
# sep/22/2018 21:53:10 by RouterOS 6.43.1
# software id = ULPL-PZAD
#
# model = 751G-2HnD
# serial number = 2F860295F138
/ip dhcp-server
add address-pool=local-dhcp authoritative=after-2sec-delay disabled=no \
interface=bridge-local lease-time=3d name=dhcpserver-local
add address-pool=neighbors authoritative=after-2sec-delay disabled=no \
interface="5 - neighbor switch" lease-time=3d name=dhcpserver-neightboors
add address-pool="public pool" disabled=no interface=bridge-public name=\
dhcpserver-public
add address-pool="pool free" disabled=no interface=bridge-free name=\
dgcpserver-free
/ip dhcp-server network
add address=10.7.7.0/24 comment=FREE dns-server=8.8.8.8,8.8.4.4 gateway=\
10.7.7.1
add address=10.8.8.0/24 comment="luch4+luch5 WIFI" dns-server=8.8.8.8,8.8.4.4 \
gateway=10.8.8.1 netmask=24
add address=10.9.9.0/24 comment=neighbor dns-server=8.8.8.8,8.8.4.4 gateway=\
10.9.9.1 netmask=24
add address=10.10.10.0/24 comment="default configuration" dns-server=\
8.8.8.8,8.8.4.4 gateway=10.10.10.1 netmask=24
Firefall
# sep/22/2018 21:54:59 by RouterOS 6.43.1
# software id = ULPL-PZAD
#
# model = 751G-2HnD
# serial number = 2F860295F138
/ip firewall filter
add action=drop chain=forward disabled=yes src-address=10.10.10.13
add action=drop chain=forward disabled=yes src-address=10.10.10.17
add action=drop chain=forward disabled=yes out-interface=sitv_pppoe \
src-address=10.7.7.12
add action=accept chain=forward disabled=yes dst-address=10.7.7.0/24 \
src-address=10.10.10.4
add action=accept chain=forward disabled=yes dst-address=10.7.7.0/24 \
src-address=10.10.10.10
add action=accept chain=forward disabled=yes dst-address=10.10.10.4 \
src-address=10.7.7.0/24
add action=accept chain=forward disabled=yes dst-address=10.10.10.10 \
src-address=10.7.7.0/24
add action=accept chain=forward disabled=yes dst-address=10.7.7.0/24 \
src-address=10.10.10.20
add action=accept chain=forward disabled=yes dst-address=10.7.7.0/24 \
src-address=10.10.10.100
add action=accept chain=forward disabled=yes dst-address=10.10.10.20 \
src-address=10.7.7.0/24
add action=accept chain=forward disabled=yes dst-address=10.10.10.100 \
src-address=10.7.7.0/24
add action=accept chain=forward comment="allow VB to internal net" \
dst-address=10.10.10.0/24 src-address=10.1.1.0/24
add action=accept chain=forward comment=\
"win7my ip list allowed, see address list main" dst-address-list=main \
src-address=10.1.1.2
add action=accept chain=forward comment=marius dst-address-list=marius \
src-address=10.1.1.10
add action=accept chain=forward comment=\
"rodad ip list allowed, see address list rodad" dst-address-list=rodad \
src-address=10.1.1.12
add action=accept chain=forward comment=\
"ro ip list allowed, see address list ro" dst-address-list=ro \
src-address=10.1.1.13
add action=accept chain=forward comment=\
"vm47 ip list allowed, see address list vm47" src-address=10.1.1.100
add action=accept chain=forward comment="allow VB to DNS 8.8.8.8" \
dst-address=8.8.8.8 src-address=10.1.1.0/24
add action=accept chain=forward comment="allow VB to DNS 8.8.4.4" \
dst-address=8.8.4.4 src-address=10.1.1.0/24
add action=drop chain=forward comment="DROP ALL VB traffic" src-address=\
10.1.1.0/24
add action=accept chain=forward comment=\
"main ip list allowed, see address list main" dst-address-list=main \
src-address=10.1.1.20
add action=drop chain=forward comment=\
"IP cams list deny internet, unless ip 148.251.193.37" dst-address=\
!148.251.193.37 log-prefix=cams src-address-list=ip_cams_to_deny
add action=drop chain=forward comment=\
"IP cams list deny internet via chereda" disabled=yes log-prefix=cams \
out-interface=*8 src-address-list=ip_cams_to_deny
add action=drop chain=forward comment="DROP FROM NEIGHBORS TO LOCAL SWITCH" \
in-interface="5 - neighbor switch" out-interface=bridge-local protocol=\
!icmp
add action=accept chain=forward comment=\
"PUBLIC BRIDGE: allow internet via sitv_pppoe" in-interface=bridge-public \
out-interface=sitv_pppoe
add action=drop chain=forward comment="PUBLIC BRIDGE: DROP ALL" in-interface=\
bridge-public
/ip firewall mangle
add action=mark-routing chain=prerouting comment=\
"My Office PC mark in case I need to route via something" disabled=yes \
new-routing-mark=via_chereda passthrough=yes src-address=10.10.10.20
add action=mark-routing chain=prerouting comment=\
"Mark with \"ru\" IP from BlockedRuIP list" dst-address-list=BlockedRuIp \
new-routing-mark=ru passthrough=yes
add action=mark-routing chain=prerouting comment=\
"VERA NOTEBOOK MARK VIA CHEREDA" disabled=yes new-routing-mark=\
via_chereda passthrough=yes src-address=10.10.10.12
add action=mark-routing chain=prerouting comment=\
"KOSTYA NOTEBOOK MARK VIA CHEREDA" disabled=yes new-routing-mark=\
via_chereda passthrough=yes src-address=10.10.10.34
add action=mark-routing chain=prerouting comment="VERA PC MARK VIA CHEREDA" \
disabled=yes new-routing-mark=via_chereda passthrough=yes src-address=\
10.10.10.98
add action=mark-routing chain=prerouting comment=\
"10.10.10.100 mark via_chereda" disabled=yes new-routing-mark=via_chereda \
passthrough=yes src-address=10.10.10.100
add action=mark-routing chain=prerouting comment=\
"VBOX mark via_chereda ALL UNLESS DEST to 10.10.10.0/24" disabled=yes \
dst-address=!10.1.1.1 new-routing-mark=via_chereda passthrough=yes \
src-address=10.1.1.0/24
/ip firewall nat
add action=masquerade chain=srcnat comment="NAT 10.10.10.0/24" src-address=\
10.10.10.0/24
add action=masquerade chain=srcnat comment="NAT NEIGHBOT 10.9.9.0/24" \
out-interface=sitv_pppoe src-address=10.9.9.0/24
add action=masquerade chain=srcnat comment="NAT public 10.8.8.0/24" \
out-interface=sitv_pppoe src-address=10.8.8.0/24
add action=masquerade chain=srcnat comment=\
"NAT free 10.7.7.0/24 via sitv_pppoe" out-interface=sitv_pppoe \
src-address=10.7.7.0/24
add action=masquerade chain=srcnat comment="VBOX NAT" src-address=10.1.1.0/24
add action=masquerade chain=srcnat comment=\
"NAT from 10.10.10.0/24 to VBOXES for VNC/ETC" dst-address=10.1.1.0/24 \
src-address=10.10.10.0/24 to-addresses=10.1.1.0/24