Thanks for all that information. I have read through it twice and think it will take another to see how it applies specifically to my devices. This is going to take some time.Good article how to setup the RB4011 device for vlans etc.......
I too would stick with other vendors wifi and get the wired only RB4011.
viewtopic.php?f=23&t=143620
IPANetEngineer, thank you for the information. I will take a look in the future however my goal is to replace my Ubiquiti USG with the RB4011 that I purchased. I do not intend to replace my Ubiquiti APs or Switch or any other hardware unless I have to (incompatibility or failure) so I am going to try and work with what I have.Consider using the Audience.
I have dumped Ubiquiti Wi-Fi for my personal and all by clients. It is now all MikroTik for Routing + Wifi [Always used MikroTik for routing....]. Some clients I will use TP-LinK EAP access points; they are nearly identical to Unifi but more stable..... hint.Keep ubiquiti for Wi-Fi, replace USG with RB4011 for routing.
Mikrotik wifi will be considerably slower than ubiquiti, especially with capsman.
CRS devices are meant to be used as switches. They can do routing, but performance will be slow.
I agree 100% with your statements. I'm waiting for MT to release new wireless devices, alongside of RouterOS 7. Time is near! Ubnt is very much dumpster fire; not to mention the data breach -- much worse than they publicly admit. I've dumped all Ubt products over year ago. Not looking back.Consider using the Audience.
MikroTik audience is fantastic for home WiFi....I have three of them as APs/MPLS routers and use a CRS328 for switching with a CCR1009 to connect to symmetric 1G fiber. Then I use OSPF/MPLS to build VPLS for the main and IoT SSIDs.
I hope we'll see MikroTik continue to add wireless features and improve performance to grab market share away from the Ubnt dumspter fire.
This is my simple home network with MikroTik wireless ;)
![]()
I did this....but where is the file saved and how do i get to it?Good news, if you want a review of your config thus far
/export hide-sensitive file=anynameyouwish
I do not run WISP, but I do lots of wireless installations …’lots’. ….. UBNT wireless is excellent in FACT outstanding …. Tik Wireless is very POOR … VERY POOR. UBNT Has AI that works really well in mesh environments … how long before MikroTik will have AI … 10 yrs ???Ubt products are consumer toys with shiny interface. Easy to turn the knobs.
Yes - Folks running a WISP will argue otherwise. That is different story with the Ubt airfiber products. Or Move to Cambium [wisp].
Yup I did find some threads about the SG108 series.I've told TP-Link that I'll bitch about this issue and warn users with any chance I get but this is ridiculous, two in two days!
@CyBuzz see what I wrote here about TL-SG108E: viewtopic.php?f=2&t=175848#p863639
And below.. since @anav was talking about a totally different switch series.
As for the config.
(1) This is new in that have not seen this set before......???
/ip firewall connection tracking set enabled=yes
(2) Missing dns-server for IOT vlan ???
/ip dhcp-server network
add address=10.10.1.0/24 comment=VPN gateway=192.168.73.1 netmask=24
add address=10.10.50.0/24 comment="VLAN500 IoT Network" gateway=10.10.50.1 \ Dns?????
netmask=24
add address=192.168.73.0/24 comment=defconf dns-server=192.168.73.226 \
gateway=192.168.73.1 netmask=24
(3) Purpose of all these being allowed to router?? Why are they all admin IT folks??
/ip firewall address-list
add address=192.168.73.2-192.168.73.254 list=allowed_to_router
add address=10.10.50.2-10.10.50.254 list=allowed_to_router
add address=10.10.1.1-10.10.1.10 list=allowed_to_router
(4) Input chain rules can be simplified, so many block rules, JUST use as last rule a drop all else rule!
As to the above (3), the allowed list SHOULD ONLY BE FOR ADMIN ACCESS.
you will still need the LAN users to access DNS services of the router.
Adjusted the order.........
ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"address-list for IP addresses, that are allowed to access router;" \
src-address-list=allowed_to_router
add action=accept chain=input comment=VPN dst-port=1194 protocol=tcp ??????????******
add action=accept chain=input comment="Allow LAN DNS queries - TCP" \
connection-state=new dst-port=53 in-interface-list=LAN protocol=tcp
add action=accept chain=input comment="Allow LAN DNS queries-UDP" \
connection-state=new dst-port=53 in-interface-list=LAN protocol=udp
add action=drop chain=input comment="drop all else"
What is the purpose of the VPN rule, just asking as its a non-standard ipsec port........
(5) Forward chain rules......... Moved Forward chain vlan rule mixed in with input chain rules further down, The Vlan500 rule is not required as you have it covered with the drop all rule at the end of the forward chain. Destination NAT rule is also not required in a drop format as you have the drop rule at the end covering that. So I modified it to allow DST NAT in the accept format.
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=accept chain=forward comment="Forward VPN to LAN" dst-address=\
192.168.73.0/24 src-address=10.10.1.0/24
add action=accept chain=forward comment="allow port forwarding"\
connection-nat-state=dstnat connection-state=new in-interface-list=WAN
add action=drop chain=input comment=\
"Drop any input packets that get this far"
it is the switch i had so i used it. I was thinking of getting a different one. Somehow though i got it to work. I created a VLAN (50) for ports 5-8 untagged, tagged port1 if i revcall and then PVID 50 on port 5-8. i just tried to get to the management webpage though and cant now....so...on to figure that out.Yup I did find some threads about the SG108 series.I've told TP-Link that I'll bitch about this issue and warn users with any chance I get but this is ridiculous, two in two days!
@CyBuzz see what I wrote here about TL-SG108E: viewtopic.php?f=2&t=175848#p863639
And below.. since @anav was talking about a totally different switch series.
I believe their may be a work around and that is ensure the PVID of 1 is replaced by any other pvid if possible (at least for trunk or hybrid ports).
or flash netgear firmware on it......... (or get a switch that works somewhat to standard)
:-) I did just that...locked out of router but luckily had a terminal session open to the router and could re-enable the rule.When you add the drop all rule at the end of the INPUT CHAIN as recommended,
AND you dont have allow rules for the admin to access the router, prior to that last rule you will be locked out of the router
I just didnt understand the purpose of the allow list you had as it didnt seem to be related to Admin access for example.
The only thing users typicallky need access to on the router is DNS services.
Thanks anav. I thought it would be easier to review just doing a /ip firewall filter print to a file than the whole thing. I have attached my current export.I dont like looking at parts of a config only as they are all related.......... and its not in winbox export format either??
You have added some of the new rule but kept the old ones which in the end does not do the job.
What was last MikroTik AP you deployed and tested against Unifi lineup? MT getting better and making a "SLOW" comeback...I do not run WISP, but I do lots of wireless installations …’lots’. ….. UBNT wireless is excellent in FACT outstanding …. Tik Wireless is very POOR … VERY POOR. UBNT Has AI that works really well in mesh environments … how long before MikroTik will have AI … 10 yrs ???Ubt products are consumer toys with shiny interface. Easy to turn the knobs.
Yes - Folks running a WISP will argue otherwise. That is different story with the Ubt airfiber products. Or Move to Cambium [wisp].
This is too funny but my spidey sense just tingled!!!
I was looking at why you still had this rule..........
add action=accept chain=forward comment=\
"Allow VLAN50 traffic to the internet(ether1)" in-interface=vlan50 \
out-interface=ether1
You have defined vlan50 as being part of the bridge but HAVE NOT DEFINED WHICH PORTS the vlan will use?
To be honest I get confused by people who
a. use the bridge do dhcp
b. then use separate vlan to do dhcp etc.
I prefer to use vlans for all traffic except maybe keeping one port for emergency access off the bridge.
Oh and yes a VLAN is NOT a bridge port and thus this line must be removed......
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=ether9
add bridge=bridge comment=defconf interface=ether10
add bridge=bridge comment=defconf interface=sfp-sfpplus1
add bridge=bridge comment=VLAN50 interface=vlan50
Be that as it may it should be doable as basically you have the bridge giving out DHCP on all the etherports which is fine.
We just need to define which ports you want your vlan to run on and
a. if the port is going to a dumb device OR
b. if the port is going to smart device.
So please let me know where v50 is going and to what devics??
Additional points..
(1) I don't have this rule on my config set on my router, nor have seen it on other config, so just stating not sure what that does??
/ip firewall connection tracking
set enabled=yes
I checked on winbox, and the closest thing I could find was
IP Firewall CONNECTIONS TAB, there is a box selection for tracking when I click on that the entries are AUTO and loose TCP tracking is checked.
The loose tcp tracking maybe related to the fact that under services I have RP Filter: "Loose" as the selection.
Funny nothing shows on the config line so maybe tis so minor as not required to mention??
In any case probably fine leaving as it is.
The second one can be set to LAN no harm.
/ip neighbor discovery-settings
set discover-interface-list=none
(2) For security purposes recommended to DISABLE , there is no reason I am aware of to make such services available.
ip service
set telnet address=192.168.73.0/24 disabled=yes
set ftp disabled=yes
set www address=192.168.73.0/24,10.10.1.0/24 port=8080
set ssh address=192.168.73.0/24 port=2200
set www-ssl address=192.168.73.0/24
set api address=192.168.73.0/24 disabled=yes
set winbox address=192.168.73.0/24
set api-ssl address=192.168.73.0/24 disabled=yes
(3) for Winbox access this should be set to LAN or MANAGEMENT and since VLAN50 is part of LAN recommend creating a Management interface listing.
/tool mac-server mac-winbox
set allowed-interface-list=Management
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=Management
/interface list member
add comment="defconf - WAN" interface=ether1 list=WAN
add comment="VLAN50 for IoT Network" interface=vlan50 list=LAN
add comment="defconf - LAN" interface=bridge list=LAN
add interface=bridge list=Management
Very nice diagram!
Questions.
1. Do you have a guest wifi for visitors?
2. Why do you have some devices on your home lan, like direcTV, ip camera, roku etc. Put them on a media VLAN for example.
In general you should shave off any devices that you do not control that has internal software from the home network (non-trusted) devices but not necessarily evil though.
3. Why do you not have a separate work network, if one or the other is infected one should ensure appropriate barriers are in place to prevent contamination in either direction but mostly home to work for example.
So looking at your layout I would have one more wlan for guests, maybe one for media, and an appropriate number of vlans added.
The only thing I cannot comment on is the unifi controller but hoping its a smart device so that you send it vlans.
(vlans for wifi and vlan which it gets its IP from for management purposes aka like home vlan if thats the managment vlan).
(1) what is the relationship between the interface ovpn-cybuzz and VLAN10?
(2) Still waiting for network diagram ;-) otherwise your bridge port settings or lack of any detail on them is confusing.
(3) Interface list members seems incomplete and why are some disabled?
For example, all your VLANs should be entered as LAN entities
If you need to identify a sub group of vlans for example create a new interface list item and use that where required in firewall rules.
(3) Your forward chain firewall rules are a mess due to (2), no diagram and no detail in bridge port settings.
(4) What devices/users use bridge Subnet ???
Glad to help on config once we have a clearer picture.
it is not shown on this diagram...all the patch panel connections patch back to the US16-150W switch on various ports.Okay a diagram to detail what is connected to each port on the RB4011 and
The only VLANs that are running through ports are the ones on my RB260GSP so the devices connected are VLAN50 and separate from my other networks. I left on port open (not vlan50) so i could connect hardwired to it with my laptop and not be forced into VLAN50a. what vlans are running through the ports.
If i understand the bridge, it is just being used to allow all the ports on the router to talk to each other. Also if i understand it correctly, i should be creating a VLAN for my "All other devices" that arent on a VLAN now and apply the DHCP that is on my bridge now to that and not have DHCP on the bridge. I think that would cover DHCP for everything that connects since everything that connects would be on a VLAN. I think i would also need to figure out the VLAN through ports thing too so i would ensure that things hardwired were on the right VLAN.b. where do you expect bridge traffic that has its own dhcp and pool etc to go and why? who and what is the bridge serving........??
Diagram observations.
The RB4011 has not connection back to the same 24 port switch??
I would have expected eth2 from the RB4011 to go to one of the ports on the 24 port switch as a trunk port carrying the necessary vlans for
untagged dumb devices and tagged smarrt devices like the TPLINK eap 245 and RB260GS etc....
I would annotate each device by the vlan it belongs too, not obvious.
which devices does the us16-150W serve (is it a smart switch?) which vlans?
What vlan is dell T30 on,
YOu have SSIDs noted but really care about vlans devices are supposed to use (not necessary) but to identify wlans yes.
Probably tried to do too much with one diagram and best to break it out.
if you have a clear idea of what you want to do then start a configuration and then check it against your diagrams to make sure its what you want.
When you have a coherent config export it here.
All smart devices should get an IP from the management LAN and thus every smart device will have the managment vlan running to it on a trunk port and doesnt necessarily need to go to any device.