I'm attempting to setup a CPU VLAN for Ubiquiti WAP. This is my lab setup that I'm trying out before applying to my RB2011 but I just realized that these two will take different approaches to VLANs. Guest VLAN is 200 which is specified on the WAP, everything else untagged should be VLAN 100.
1. RB750GR3 uses the CPU for VLANs but I noticed that in the default config when adding ports ether2 .. 5 it has hw offload on. To enable VLANs here I had to turn it off. How does the router works with this on? Shouldn't it error out?
2. One side effect that I didn't think through is how do I access the WebFig now which I assume is in VLAN 1? I seem to be locked out of the config. Do I setup a management VLAN? I would prefer to access it from VLAN 100. Not sure what the normal approach here is.
3. Does the configuration below look sane? I combined the MikroTik online Manual with various posts from the forum.
Configuration:
Code: Select all
# model = RB750Gr3
/interface bridge
add admin-mac=B8:69:F4:AB:32:8A auto-mac=no comment=defconf name=bridge
/interface vlan
add interface=bridge name=vlan100 vlan-id=100
add interface=bridge name=vlan200 vlan-id=200
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=dhcp_pool1 ranges=10.1.100.100-10.1.100.199
add name=dhcp_pool2 ranges=10.1.200.200-10.1.200.250
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
add address-pool=dhcp_pool1 disabled=no interface=vlan100 name=dhcp1
add address-pool=dhcp_pool2 disabled=no interface=vlan200 name=dhcp2
/interface bridge port
add bridge=bridge comment=defconf hw=no interface=ether2 pvid=100
add bridge=bridge comment=defconf hw=no interface=ether3 pvid=100
add bridge=bridge comment=defconf hw=no interface=ether4 pvid=100
add bridge=bridge comment=defconf hw=no interface=ether5 pvid=100
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=bridge tagged=bridge,ether3 vlan-ids=200
add bridge=bridge tagged=bridge untagged=ether2,ether3,ether4,ether5 vlan-ids=100
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
add address=10.1.100.1/24 interface=vlan100 network=10.1.100.0
add address=10.1.200.1/24 interface=vlan200 network=10.1.200.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server network
add address=10.1.100.0/24 gateway=10.1.100.1
add address=10.1.200.0/24 gateway=10.1.200.1
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/interface bridge set bridge vlan-filtering=yes