Add a bridge interface "Bridge_Public" and assign an IP address:
Code: Select all
/interface bridge
add name=Bridge_Public
/ip address
add address=10.10.10.1/24 interface=Bridge_Public network=10.10.10.0
Add a virtual wireless interface "wlan3-public" and add it to the new bridge interface "Bridge_Public":
Code: Select all
/interface wireless
add disabled=no keepalive-frames=disabled mac-address=BA:69:F4:35:EC:CB master-interface=wlan1-CORP multicast-buffering=disabled name=wlan3-public ssid=CORP-Guest wds-cost-range=0 wds-default-cost=0 wps-mode=disabled
/interface bridge port
add bridge=Bridge_Public interface=wlan3-public
Configure a DHCP Server "DHCP_Public" with IP pool "pool_Public" and assign it to the new bridge interface "Bridge_Public":
Code: Select all
/ip pool
add name=pool_Public ranges=10.10.10.101-10.10.10.199
/ip dhcp-server
add address-pool=pool_Public disabled=no interface=Bridge_Public name=DHCP_Public
/ip dhcp-server network
add address=10.10.10.0/24 dns-server=8.8.8.8 gateway=10.10.10.1
Add filter rules to prevent guest wifi users from communicating to corporate network
Code: Select all
/ip firewall filter
add action=drop chain=forward in-interface=Bridge_Public out-interface=Bridge_CORP
add action=drop chain=forward in-interface=Bridge_CORP out-interface=Bridge_Public
QUESTION:[/b ]Is it appropriate to use a single masquerade rule from the default configuration; such as:
Code: Select all
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN