Hello sindy,
I don't want to get you to loose your patience, so you get here the full config of the 4011 - all lines:
Its a little bit changed to the former ones, as the fault you said to me (Remove vlans from untagged list and some more minor points)
# nov/07/2020 23:38:48 by RouterOS 6.47.7
# software id = privat
#
# model = RB4011iGS+5HacQ2HnD
# serial number = privat
/caps-man channel
add band=2ghz-g/n control-channel-width=20mhz extension-channel=disabled frequency=2412,2432,2452,2472 name=2Gch1-5-9-13 save-selected=yes tx-power=-7
add band=5ghz-n/ac extension-channel=disabled frequency=5180,5200,5220,5240,5260,5280,5300,5320,5500,5520,5540,5560 name=5G save-selected=yes
/caps-man datapath
add client-to-client-forwarding=yes local-forwarding=yes name=VLAN100 vlan-id=100 vlan-mode=use-tag
add client-to-client-forwarding=no local-forwarding=yes name=VLAN200 vlan-id=200 vlan-mode=use-tag
add client-to-client-forwarding=no local-forwarding=yes name=VLAN500 vlan-id=500 vlan-mode=use-tag
/interface bridge
add frame-types=admit-only-vlan-tagged name=bridge_LAN vlan-filtering=yes
/interface wireless
# managed by CAPsMAN
# channel: 2412/20/gn(-10dBm), SSID: Stuff, local forwarding
set [ find default-name=wlan2 ] disabled=no name=wlan2G ssid=MikroTik
# managed by CAPsMAN
# channel: 5180/20/ac/P(20dBm), SSID: Stuff, local forwarding
set [ find default-name=wlan1 ] disabled=no name=wlan5G ssid=MikroTik
/interface ethernet
set [ find default-name=sfp-sfpplus1 ] name=E0-sfp_Uplink
set [ find default-name=ether1 ] name=E1_Internet
set [ find default-name=ether2 ] name=E2_BUp_Sw11
set [ find default-name=ether3 ] name=E3_BUp_Sw12
set [ find default-name=ether4 ] name=E4_BUp_Sw21
set [ find default-name=ether5 ] name=E5_BUp_Sw22
set [ find default-name=ether6 ] name=E6_BUp_11
set [ find default-name=ether7 ] name=E7_BUp_12
set [ find default-name=ether8 ] name=E9_BUp_21
set [ find default-name=ether9 ] name=E9_BUp_22
set [ find default-name=ether10 ] name="E10_AP" poe-out=forced-on
/interface ovpn-server
add name=ovpnDZO2 user=DirkLT
add name=ovpnDZO user=DirkPC
add name=ovpn-Florian user=Florian
add name=ovpn-Ralf user=Ralf
/interface vlan
add interface=bridge_LAN name=vlan100 vlan-id=100
add interface=bridge_LAN name=vlan200 vlan-id=200
add interface=bridge_LAN name=vlan500 vlan-id=500
add interface=bridge_LAN name=vlan800 vlan-id=800
add interface=bridge_LAN name=vlan900 vlan-id=900
/interface bonding
add link-monitoring=none mode=802.3ad name=bond_1 slaves=E2_BUp_Sw11,E3_BUp_Sw12 transmit-hash-policy=layer-2-and-3
add link-monitoring=none mode=802.3ad name=bond_2 slaves=E9_BUp_21,E9_BUp_22 transmit-hash-policy=layer-2-and-3
add link-monitoring=none mode=802.3ad name=bond_Switch1 slaves=E6_BUp_11,E7_BUp_12 transmit-hash-policy=layer-2-and-3
add link-monitoring=none mode=802.3ad name=bond_Switch2 slaves=E4_BUp_Sw21,E5_BUp_Sw22 transmit-hash-policy=layer-2-and-3
/caps-man rates
add basic=12Mbps name=rate2G supported=12Mbps,18Mbps,24Mbps,36Mbps,48Mbps,54Mbps
/caps-man security
add authentication-types=wpa2-psk disable-pmkid=yes encryption=aes-ccm group-encryption=aes-ccm group-key-update=5m name=Stuff
add authentication-types=wpa2-psk encryption=aes-ccm group-encryption=aes-ccm group-key-update=5m name=Guest
add name=Free
add authentication-types=wpa2-psk disable-pmkid=yes encryption=aes-ccm group-encryption=aes-ccm group-key-update=5m name=Tec
/caps-man configuration
add channel=2Gch1-5-9-13 country=germany datapath=VLAN200 mode=ap multicast-helper=full name=Tec_2G rates=rate2G security=Tec ssid=Tec-2G
add channel=5G country=germany datapath=VLAN200 mode=ap multicast-helper=full name=Tec_5G security=Tec ssid=Tec-5G
add channel=2Gch1-5-9-13 country=germany datapath=VLAN100 mode=ap multicast-helper=full name="Stuff 2G" rates=rate2G security=Stuff ssid=Stuff
add channel=5G country=germany datapath=VLAN100 mode=ap multicast-helper=full name="Stuff 5G" security=Stuff ssid=Stuff
add channel=2Gch1-5-9-13 country=germany datapath=VLAN500 mode=ap multicast-helper=full name="Guest 2G" rates=rate2G security=Guest ssid=Guest
add channel=5G country=germany datapath=VLAN500 mode=ap multicast-helper=full name="Guest 5G" security=Guest ssid=Guest
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=pool100 ranges=192.168.102.1-192.168.110.253
add name=pool200 ranges=192.168.121.1-192.168.127.254
add name=pool500 ranges=192.168.130.1-192.168.149.253
add name=pool800 ranges=192.168.181.1-192.168.183.253
add name=pool900 ranges=192.168.184.1-192.168.189.254
add name=pool201.64ovpnMaster ranges=192.168.201.253-192.168.201.254
add name=pool201.63ovpnMaster next-pool=pool201.64ovpnMaster ranges=192.168.201.249-192.168.201.250
add name=pool201.62ovpnMaster next-pool=pool201.63ovpnMaster ranges=192.168.201.245-192.168.201.246
add name=pool201.61ovpnMaster next-pool=pool201.62ovpnMaster ranges=192.168.201.241-192.168.201.242
add name=pool201.60ovpnMaster next-pool=pool201.61ovpnMaster ranges=192.168.201.237-192.168.201.238
add name=pool201.59ovpnMaster next-pool=pool201.60ovpnMaster ranges=192.168.201.233-192.168.201.234
add name=pool201.58ovpnMaster next-pool=pool201.59ovpnMaster ranges=192.168.201.229-192.168.201.230
add name=pool201.57ovpnMaster next-pool=pool201.58ovpnMaster ranges=192.168.201.225-192.168.201.226
add name=pool201.56ovpnMaster next-pool=pool201.57ovpnMaster ranges=192.168.201.221-192.168.201.222
add name=pool201.55ovpnMaster next-pool=pool201.56ovpnMaster ranges=192.168.201.217-192.168.201.218
add name=pool201.54ovpnMaster next-pool=pool201.55ovpnMaster ranges=192.168.201.213-192.168.201.214
add name=pool201.53ovpnMaster next-pool=pool201.54ovpnMaster ranges=192.168.201.209-192.168.201.210
add name=pool201.52ovpnMaster next-pool=pool201.53ovpnMaster ranges=192.168.201.205-192.168.201.206
add name=pool201.51ovpnMaster next-pool=pool201.52ovpnMaster ranges=192.168.201.201-192.168.201.202
add name=pool201.50ovpnMaster next-pool=pool201.51ovpnMaster ranges=192.168.201.197-192.168.201.198
add name=pool201.49ovpnMaster next-pool=pool201.50ovpnMaster ranges=192.168.201.193-192.168.201.194
add name=pool201.48ovpnMaster next-pool=pool201.49ovpnMaster ranges=192.168.201.189-192.168.201.190
add name=pool201.47ovpnMaster next-pool=pool201.48ovpnMaster ranges=192.168.201.185-192.168.201.186
add name=pool201.46ovpnMaster next-pool=pool201.47ovpnMaster ranges=192.168.201.181-192.168.201.182
add name=pool201.45ovpnMaster next-pool=pool201.46ovpnMaster ranges=192.168.201.177-192.168.201.178
add name=pool201.44ovpnMaster next-pool=pool201.45ovpnMaster ranges=192.168.201.173-192.168.201.174
add name=pool201.43ovpnMaster next-pool=pool201.44ovpnMaster ranges=192.168.201.169-192.168.201.170
add name=pool201.42ovpnMaster next-pool=pool201.43ovpnMaster ranges=192.168.201.165-192.168.201.166
add name=pool201.41ovpnMaster next-pool=pool201.42ovpnMaster ranges=192.168.201.161-192.168.201.162
add name=pool201.40ovpnMaster next-pool=pool201.41ovpnMaster ranges=192.168.201.157-192.168.201.158
add name=pool201.39ovpnMaster next-pool=pool201.40ovpnMaster ranges=192.168.201.153-192.168.201.154
add name=pool201.38ovpnMaster next-pool=pool201.39ovpnMaster ranges=192.168.201.149-192.168.201.150
add name=pool201.37ovpnMaster next-pool=pool201.38ovpnMaster ranges=192.168.201.145-192.168.201.146
add name=pool201.36ovpnMaster next-pool=pool201.37ovpnMaster ranges=192.168.201.141-192.168.201.142
add name=pool201.35ovpnMaster next-pool=pool201.36ovpnMaster ranges=192.168.201.137-192.168.201.138
add name=pool201.34ovpnMaster next-pool=pool201.35ovpnMaster ranges=192.168.201.133-192.168.201.134
add name=pool201.33ovpnMaster next-pool=pool201.34ovpnMaster ranges=192.168.201.129-192.168.201.130
add name=pool201.32ovpnMaster next-pool=pool201.33ovpnMaster ranges=192.168.201.125-192.168.201.126
add name=pool201.31ovpnMaster next-pool=pool201.32ovpnMaster ranges=192.168.201.121-192.168.201.122
add name=pool201.30ovpnMaster next-pool=pool201.31ovpnMaster ranges=192.168.201.117-192.168.201.118
add name=pool201.29ovpnMaster next-pool=pool201.30ovpnMaster ranges=192.168.201.113-192.168.201.114
add name=pool201.28ovpnMaster next-pool=pool201.29ovpnMaster ranges=192.168.201.109-192.168.201.110
add name=pool201.27ovpnMaster next-pool=pool201.28ovpnMaster ranges=192.168.201.105-192.168.201.106
add name=pool201.26ovpnMaster next-pool=pool201.27ovpnMaster ranges=192.168.201.101-192.168.201.102
add name=pool201.25ovpnMaster next-pool=pool201.26ovpnMaster ranges=192.168.201.97-192.168.201.98
add name=pool201.24ovpnMaster next-pool=pool201.25ovpnMaster ranges=192.168.201.93-192.168.201.94
add name=pool201.23ovpnMaster next-pool=pool201.24ovpnMaster ranges=192.168.201.89-192.168.201.90
add name=pool201.22ovpnMaster next-pool=pool201.23ovpnMaster ranges=192.168.201.85-192.168.201.86
add name=pool201.21ovpnMaster next-pool=pool201.22ovpnMaster ranges=192.168.201.81-192.168.201.82
add name=pool201.20ovpnMaster next-pool=pool201.21ovpnMaster ranges=192.168.201.77-192.168.201.78
add name=pool201.19ovpnMaster next-pool=pool201.20ovpnMaster ranges=192.168.201.73-192.168.201.74
add name=pool201.18ovpnMaster next-pool=pool201.19ovpnMaster ranges=192.168.201.69-192.168.201.70
add name=pool201.17ovpnMaster next-pool=pool201.18ovpnMaster ranges=192.168.201.65-192.168.201.66
add name=pool201.16ovpnMaster next-pool=pool201.17ovpnMaster ranges=192.168.201.61-192.168.201.62
add name=pool201.15ovpnMaster next-pool=pool201.16ovpnMaster ranges=192.168.201.57-192.168.201.58
add name=pool201.14ovpnMaster next-pool=pool201.15ovpnMaster ranges=192.168.201.53-192.168.201.54
add name=pool201.13ovpnMaster next-pool=pool201.14ovpnMaster ranges=192.168.201.49-192.168.201.50
add name=pool201.12ovpnMaster next-pool=pool201.13ovpnMaster ranges=192.168.201.45-192.168.201.46
add name=pool201.11ovpnMaster next-pool=pool201.12ovpnMaster ranges=192.168.201.41-192.168.201.42
add name=pool201.10ovpnMaster next-pool=pool201.11ovpnMaster ranges=192.168.201.37-192.168.201.38
add name=pool201.09ovpnMaster next-pool=pool201.10ovpnMaster ranges=192.168.201.33-192.168.201.34
add name=pool201.08ovpnMaster next-pool=pool201.09ovpnMaster ranges=192.168.201.29-192.168.201.30
add name=pool201.07ovpnMaster next-pool=pool201.08ovpnMaster ranges=192.168.201.25-192.168.201.26
add name=pool201.06ovpnMaster next-pool=pool201.07ovpnMaster ranges=192.168.201.21-192.168.201.22
add name=pool201.05ovpnMaster next-pool=pool201.06ovpnMaster ranges=192.168.201.17-192.168.201.18
add name=pool201.04ovpnMaster next-pool=pool201.05ovpnMaster ranges=192.168.201.13-192.168.201.14
add name=pool201.03ovpnMaster next-pool=pool201.04ovpnMaster ranges=192.168.201.9-192.168.201.10
add name=pool201.02ovpnMaster next-pool=pool201.03ovpnMaster ranges=192.168.201.5-192.168.201.6
add comment=Master-OpenVPN-Port name=pool201.01ovpnMaster next-pool=pool201.02ovpnMaster ranges=192.168.201.1-192.168.201.2
/ip dhcp-server
add address-pool=pool100 disabled=no interface=vlan100 name=dhcp100
add address-pool=pool200 disabled=no interface=vlan200 lease-time=1h name=dhcp200
add address-pool=pool500 disabled=no interface=vlan500 lease-time=30m name=dhcp500
add address-pool=pool800 disabled=no interface=vlan800 name=dhcp800
add address-pool=pool900 disabled=no interface=vlan900 name=dhcp900
/ppp profile
add dns-server=192.168.100.1 local-address=pool201.01ovpnMaster name=RoadWarrior remote-address=pool201.01ovpnMaster use-compression=no use-encryption=required wins-server=192.168.100.1
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes upgrade-policy=suggest-same-version
/caps-man provisioning
add action=create-dynamic-enabled hw-supported-modes=ac master-configuration="Stuff 5G" name-format=prefix-identity name-prefix=cap5G slave-configurations="Tec_5G,Guest 5G"
add action=create-dynamic-enabled hw-supported-modes=gn identity-regexp=.*Rest.* master-configuration="Stuff 2G" name-format=prefix-identity name-prefix=capR2G slave-configurations="Guest 2G,Stuff 2G"
add action=create-dynamic-enabled hw-supported-modes=gn identity-regexp=.*Tec.* master-configuration=Tec_2G name-format=prefix-identity name-prefix=capT2G
add action=create-dynamic-enabled hw-supported-modes=g,gn identity-regexp=.*All.* master-configuration="Stuff 2G" name-format=prefix-identity name-prefix=cap2G slave-configurations="Tec_2G,Guest 2G"
add action=create-dynamic-enabled disabled=yes hw-supported-modes=gn master-configuration="Stuff 2G" name-format=prefix-identity name-prefix=cap2G slave-configurations="Tec_2G,Guest 2G"
/interface bridge filter
add action=mark-packet chain=forward in-interface=E0-sfp_Uplink log-prefix=PacketMark mac-protocol=vlan new-packet-mark=VLAN100 vlan-id=100
/interface bridge port
add bridge=bridge_LAN frame-types=admit-only-vlan-tagged ingress-filtering=yes interface="E10_AP" pvid=100
add bridge=bridge_LAN frame-types=admit-only-vlan-tagged ingress-filtering=yes interface=E0-sfp_Uplink
add bridge=bridge_LAN frame-types=admit-only-vlan-tagged ingress-filtering=yes interface=bond_1 pvid=100
add bridge=bridge_LAN interface=bond_Switch1
add bridge=bridge_LAN interface=bond_Switch2
add bridge=bridge_LAN frame-types=admit-only-vlan-tagged ingress-filtering=yes interface=bond_2
/interface bridge settings
set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
/interface bridge vlan
add bridge=bridge_LAN tagged="bridge_LAN,bond_Switch1,bond_Switch2,bond_2,bond_1,E0-sfp_Uplink,E10_AP" vlan-ids=100
add bridge=bridge_LAN tagged="bridge_LAN,E10_AP,bond_1,bond_Switch1,bond_Switch2,bond_2,E0-sfp_Uplink" vlan-ids=200
add bridge=bridge_LAN tagged="bridge_LAN,E10_AP,bond_1,bond_Switch1,bond_Switch2,bond_2,E0-sfp_Uplink" vlan-ids=500
add bridge=bridge_LAN tagged=bridge_LAN,bond_Switch1,bond_Switch2,E0-sfp_Uplink vlan-ids=800
add bridge=bridge_LAN tagged=bridge_LAN,bond_Switch2,bond_Switch1,E0-sfp_Uplink vlan-ids=900
/interface list member
add interface=E1_Internet list=WAN
/interface ovpn-server server
set auth=sha1 certificate=ourOwnCertificat.crt_0 cipher=aes256 default-profile=RoadWarrior enabled=yes mode=ethernet netmask=20 require-client-certificate=yes
/interface wireless cap
#
set bridge=bridge_LAN certificate=request discovery-interfaces=vlan200 enabled=yes interfaces=wlan2G,wlan5G
/ip address
add address=192.168.100.1/20 comment="Main network" interface=vlan100 network=192.168.96.0
add address=192.168.120.1/20 comment="Public address system" interface=vlan200 network=192.168.112.0
add address=192.168.150.1/19 comment="Guests" interface=vlan500 network=192.168.128.0
add address=192.168.180.1/21 comment="Small Net" interface=vlan800 network=192.168.176.0
add address=192.168.190.1/23 comment="Big Net" interface=vlan900 network=192.168.190.0
add address=192.168.100.2/20 comment="Routing-MASQ" interface=vlan100 network=192.168.96.0
add address=192.168.64.2/24 comment="External ip" interface=E1_Internet network=192.168.64.0
add address=192.168.100.3/20 comment="RoadWarrior Masq" interface=vlan100 network=192.168.96.0
/ip dhcp-server lease
add address=192.168.100.100 client-id=1:5c:f4:ab:e4:c0:8f comment="Server1" mac-address=5C:F4:XX:XX:XX:XX server=dhcp100
add address=192.168.120.101 client-id=1:94:db:XX:XX:XX:XX comment="Tec Video SmallHall" mac-address=94:DB:XX:XX:XX:XX server=dhcp200
add address=192.168.120.102 client-id=1:94:db:XX:XX:XX:XX comment="Tec Video BigHall" mac-address=94:DB:XX:XX:XX:XX server=dhcp200
add address=192.168.100.110 client-id=1:ec:XX:XX:XX:XX comment="Printer" mac-address=EC:9A:XX:XX:XX:XX server=dhcp100
add address=192.168.100.111 client-id=1:0:1b:XX:XX:XX:XX mac-address=00:1B:XX:XX:XX:XX server=dhcp100
/ip dhcp-server network
add address=192.168.96.0/20 comment=Main dns-server=192.168.100.1 gateway=192.168.100.1
add address=192.168.112.0/20 comment=Event_Tec dns-server=192.168.120.1 gateway=192.168.120.1
add address=192.168.128.0/19 comment=Guest dns-server=192.168.150.1 gateway=192.168.150.1
add address=192.168.176.0/21 comment="Small Net" dns-server=192.168.180.1 gateway=192.168.180.1
add address=192.168.190.0/23 comment="Big Net" dns-server=192.168.190.1 gateway=192.168.190.1
/ip dns
set allow-remote-requests=yes servers=192.168.100.2,192.168.64.1
/ip firewall filter
add action=fasttrack-connection chain=forward comment="fasttrack" connection-state=established,related
add action=accept chain=forward comment="Acc Forw established,related, untracked" connection-state=established,related,untracked
add action=accept chain=forward comment="Muticasts" dst-address=224.0.0.0/4 log-prefix=Multicast
add action=accept chain=forward log-prefix=Multicast src-address=224.0.0.0/4
add action=drop chain=forward comment="Drop Forw invalid" connection-state=invalid
add action=accept chain=forward comment="Own networks" dst-address=192.168.96.0/20 log-prefix=StuffNet src-address=192.168.96.0/20
add action=accept chain=forward dst-address=192.168.112.0/20 log-prefix=TecNet src-address=192.168.112.0/20
add action=accept chain=forward dst-address=192.168.176.0/21 log-prefix=SmallNet src-address=192.168.176.0/21
add action=accept chain=forward dst-address=192.168.190.0/23 log-prefix=BigNet src-address=192.168.190.0/23
add action=accept chain=forward dst-address=192.168.120.1 log-prefix="Guests only router" src-address=192.168.128.0/19
add action=accept chain=forward comment="Own network to internet" in-interface=vlan100 log-prefix=StuffNet out-interface=E1_Internet src-address=192.168.96.0/20
add action=accept chain=forward in-interface=vlan200 log-prefix=TecNet out-interface=E1_Internet src-address=192.168.112.0/20
add action=accept chain=forward in-interface=vlan500 log-prefix=Guests out-interface=E1_Internet src-address=192.168.128.0/19
add action=accept chain=forward in-interface=vlan800 log-prefix=SmallNet out-interface=E1_Internet src-address=192.168.176.0/21
add action=accept chain=forward in-interface=vlan900 log-prefix=BigNet out-interface=E1_Internet src-address=192.168.190.0/23
add action=accept chain=forward comment="Allow router network all" log-prefix="From router/switch network" src-address=192.168.100.0/24
add action=accept chain=input comment="Acc Input established,related,untracked" connection-state=established,related,untracked
add action=accept chain=input comment="Winbox Firewall" dst-port=8291 protocol=tcp
add action=accept chain=output log-prefix=Winbox->DirksLT protocol=tcp src-port=8291
add action=accept chain=input comment=OpenVPN dst-port=1194 log-prefix="VPN In" protocol=tcp
add action=accept chain=output log-prefix="VPN Out" protocol=tcp src-port=1194
add action=accept chain=forward comment="Mikrotik Discovery" log-prefix="Mikrotik Discovery rules" port=5678 protocol=udp src-address=192.168.96.0/20
add action=accept chain=forward log-prefix="Mikrotik Discovery do it" port=5678 protocol=udp src-address=192.168.112.0/20
add action=accept chain=forward dst-address=192.168.96.0/20 log-prefix="Mikrotik Discovery other way" port=5678 protocol=udp
add action=accept chain=forward dst-address=192.168.112.0/20 log-prefix="Mikrotik Discovery everything ok" port=5678 protocol=udp
add action=accept chain=forward log-prefix="Mikrotik Diskover all" port=5678 protocol=udp
# ovpnDZO not ready
add action=accept chain=forward comment="OVPN allow everything" in-interface=ovpnDZO log-prefix="OVPN allow all" src-address=192.168.201.0/24
add action=accept chain=forward in-interface=ovpnDZO2 log-prefix="OVPN Welcome" src-address=192.168.201.0/24
# ovpn-Ralf not ready
add action=accept chain=forward in-interface=ovpn-Ralf log-prefix="OVPN do everything you want" src-address=192.168.201.0/24
# ovpn-Florian not ready
add action=accept chain=forward in-interface=ovpn-Florian log-prefix="OVPN do everything too" src-address=192.168.201.0/24
add action=accept chain=forward comment="Back OVPN_Network" dst-address=192.168.201.0/24 log-prefix="Back OVPN_Network"
add action=drop chain=input comment="Drop Input invalid" connection-state=invalid
add action=accept chain=input comment="Acc ICMP" protocol=icmp
add action=accept chain=input comment="Acc loopback (i.e. CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="Drop all not LAN - Disabled" disabled=yes in-interface-list=!LAN
add action=accept chain=forward comment="Acc ipsec-in" ipsec-policy=in,ipsec
add action=accept chain=forward comment="Acc ipsec-out" ipsec-policy=out,ipsec
add action=drop chain=forward comment="Drop WAN not asked for" connection-nat-state=!dstnat connection-state=new in-interface=E1_Internet
add action=drop chain=forward comment="Everything not allowed is forbidden" log=yes log-prefix="Not allowed!"
/ip firewall mangle
add action=log chain=forward log-prefix="Test IP1:" src-address=192.168.10.1
add action=log chain=prerouting dst-address=192.168.100.1 log-prefix="Test IP2:" src-address=192.168.127.200
add action=mark-packet chain=prerouting dst-address=192.168.112.0/20 new-packet-mark=Tec passthrough=yes
add action=mark-packet chain=prerouting new-packet-mark=Tec passthrough=yes src-address=192.168.112.0/20
add action=mark-packet chain=prerouting dst-address=192.168.128.0/20 new-packet-mark=Guests passthrough=yes
add action=mark-packet chain=prerouting new-packet-mark=Guests passthrough=yes src-address=192.168.128.0/20
/ip firewall nat
add action=masquerade chain=srcnat comment="Masq outside" ipsec-policy=out,none out-interface=E1_Internet
add action=dst-nat chain=dstnat comment=Routing-MASQ dst-address=192.168.100.2 to-addresses=192.168.64.1
add action=dst-nat chain=dstnat comment="Machines for TecNet: Server, Printer" dst-address=192.168.120.100 in-interface=vlan200 to-addresses=192.168.100.100
add action=dst-nat chain=dstnat dst-address=192.168.120.110 in-interface=vlan200 to-addresses=192.168.100.110
add action=dst-nat chain=dstnat dst-address=192.168.120.111 in-interface=vlan200 to-addresses=192.168.100.111
add action=src-nat chain=srcnat comment="Road Warrior" src-address=192.168.201.0/24 to-addresses=192.168.100.3
/ip route
add distance=1 gateway=192.168.64.1
add distance=1 dst-address=192.168.1.0/24 gateway=192.168.100.20
add distance=1 dst-address=192.168.88.0/24 gateway=192.168.100.20
/ppp secret
add name=DZO profile=RoadWarrior
add name=Florian profile=RoadWarrior service=ovpn
add name=DZO1 profile=RoadWarrior
add name=Ralf profile=RoadWarrior
/routing pim interface
add alternative-subnets=192.168.112.0/20,192.168.96.0/20,192.168.128.0/19 interface=vlan100
add alternative-subnets=192.168.112.0/20,192.168.96.0/20,192.168.128.0/19 interface=vlan200
/routing pim rp
add address=192.168.120.1
/system clock
set time-zone-name=Europe/Berlin
/system identity
set name=Router_All
/system leds
add interface=wlan2G leds="wlan2G_signal1-led,wlan2G_signal2-led,wlan2G_signal3-led,wlan2G_signal4-led,wlan2G_signal5-led" type=wireless-signal-strength
add interface=wlan2G leds=wlan2G_tx-led type=interface-transmit
add interface=wlan2G leds=wlan2G_rx-led type=interface-receive
/system logging
add disabled=yes topics=debug,!ntp
/system ntp client
set enabled=yes primary-ntp=192.53.103.108 secondary-ntp=192.53.103.104 server-dns-names=192.168.100.1
/system script
add dont-require-permissions=no name=script1 owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/ip pool\r\n
add name=pool201.64ovpnMaster ranges=192.168.201.253-192.168.201.254\r\n
add name=pool201.63ovpnMaster next-pool=pool201.64ovpnMaster ranges=192.168.201.249-192.168.201.250\r\n
add name=pool201.62ovpnMaster next-pool=pool201.63ovpnMaster ranges=192.168.201.245-192.168.201.246\r\n
add name=pool201.61ovpnMaster next-pool=pool201.62ovpnMaster ranges=192.168.201.241-192.168.201.242\r\n
add name=pool201.60ovpnMaster next-pool=pool201.61ovpnMaster ranges=192.168.201.237-192.168.201.238\r\n
add name=pool201.59ovpnMaster next-pool=pool201.60ovpnMaster ranges=192.168.201.233-192.168.201.234\r\n
add name=pool201.58ovpnMaster next-pool=pool201.59ovpnMaster ranges=192.168.201.229-192.168.201.230\r\n
add name=pool201.57ovpnMaster next-pool=pool201.58ovpnMaster ranges=192.168.201.225-192.168.201.226\r\n
add name=pool201.56ovpnMaster next-pool=pool201.57ovpnMaster ranges=192.168.201.221-192.168.201.222\r\n
add name=pool201.55ovpnMaster next-pool=pool201.56ovpnMaster ranges=192.168.201.217-192.168.201.218\r\n
add name=pool201.54ovpnMaster next-pool=pool201.55ovpnMaster ranges=192.168.201.213-192.168.201.214\r\n
add name=pool201.53ovpnMaster next-pool=pool201.54ovpnMaster ranges=192.168.201.209-192.168.201.210\r\n
add name=pool201.52ovpnMaster next-pool=pool201.53ovpnMaster ranges=192.168.201.205-192.168.201.206\r\n
add name=pool201.51ovpnMaster next-pool=pool201.52ovpnMaster ranges=192.168.201.201-192.168.201.202\r\n
add name=pool201.50ovpnMaster next-pool=pool201.51ovpnMaster ranges=192.168.201.197-192.168.201.198\r\n
add name=pool201.49ovpnMaster next-pool=pool201.50ovpnMaster ranges=192.168.201.193-192.168.201.194\r\n
add name=pool201.48ovpnMaster next-pool=pool201.49ovpnMaster ranges=192.168.201.189-192.168.201.190\r\n
add name=pool201.47ovpnMaster next-pool=pool201.48ovpnMaster ranges=192.168.201.185-192.168.201.186\r\n
add name=pool201.46ovpnMaster next-pool=pool201.47ovpnMaster ranges=192.168.201.181-192.168.201.182\r\n
add name=pool201.45ovpnMaster next-pool=pool201.46ovpnMaster ranges=192.168.201.177-192.168.201.178\r\n
add name=pool201.44ovpnMaster next-pool=pool201.45ovpnMaster ranges=192.168.201.173-192.168.201.174\r\n
add name=pool201.43ovpnMaster next-pool=pool201.44ovpnMaster ranges=192.168.201.169-192.168.201.170\r\n
add name=pool201.42ovpnMaster next-pool=pool201.43ovpnMaster ranges=192.168.201.165-192.168.201.166\r\n
add name=pool201.41ovpnMaster next-pool=pool201.42ovpnMaster ranges=192.168.201.161-192.168.201.162\r\n
add name=pool201.40ovpnMaster next-pool=pool201.41ovpnMaster ranges=192.168.201.157-192.168.201.158\r\n
add name=pool201.39ovpnMaster next-pool=pool201.40ovpnMaster ranges=192.168.201.153-192.168.201.154\r\n
add name=pool201.38ovpnMaster next-pool=pool201.39ovpnMaster ranges=192.168.201.149-192.168.201.150\r\n
add name=pool201.37ovpnMaster next-pool=pool201.38ovpnMaster ranges=192.168.201.145-192.168.201.146\r\n
add name=pool201.36ovpnMaster next-pool=pool201.37ovpnMaster ranges=192.168.201.141-192.168.201.142\r\n
add name=pool201.35ovpnMaster next-pool=pool201.36ovpnMaster ranges=192.168.201.137-192.168.201.138\r\n
add name=pool201.34ovpnMaster next-pool=pool201.35ovpnMaster ranges=192.168.201.133-192.168.201.134\r\n
add name=pool201.33ovpnMaster next-pool=pool201.34ovpnMaster ranges=192.168.201.129-192.168.201.130\r\n
add name=pool201.32ovpnMaster next-pool=pool201.33ovpnMaster ranges=192.168.201.125-192.168.201.126\r\n
add name=pool201.31ovpnMaster next-pool=pool201.32ovpnMaster ranges=192.168.201.121-192.168.201.122\r\n
add name=pool201.30ovpnMaster next-pool=pool201.31ovpnMaster ranges=192.168.201.117-192.168.201.118\r\n
add name=pool201.29ovpnMaster next-pool=pool201.30ovpnMaster ranges=192.168.201.113-192.168.201.114\r\n
add name=pool201.28ovpnMaster next-pool=pool201.29ovpnMaster ranges=192.168.201.109-192.168.201.110\r\n
add name=pool201.27ovpnMaster next-pool=pool201.28ovpnMaster ranges=192.168.201.105-192.168.201.106\r\n
add name=pool201.26ovpnMaster next-pool=pool201.27ovpnMaster ranges=192.168.201.101-192.168.201.102\r\n
add name=pool201.25ovpnMaster next-pool=pool201.26ovpnMaster ranges=192.168.201.97-192.168.201.98\r\n
add name=pool201.24ovpnMaster next-pool=pool201.25ovpnMaster ranges=192.168.201.93-192.168.201.94\r\n
add name=pool201.23ovpnMaster next-pool=pool201.24ovpnMaster ranges=192.168.201.89-192.168.201.90\r\n
add name=pool201.22ovpnMaster next-pool=pool201.23ovpnMaster ranges=192.168.201.85-192.168.201.86\r\n
add name=pool201.21ovpnMaster next-pool=pool201.22ovpnMaster ranges=192.168.201.81-192.168.201.82\r\n
add name=pool201.20ovpnMaster next-pool=pool201.21ovpnMaster ranges=192.168.201.77-192.168.201.78\r\n
add name=pool201.19ovpnMaster next-pool=pool201.20ovpnMaster ranges=192.168.201.73-192.168.201.74\r\n
add name=pool201.18ovpnMaster next-pool=pool201.19ovpnMaster ranges=192.168.201.69-192.168.201.70\r\n
add name=pool201.17ovpnMaster next-pool=pool201.18ovpnMaster ranges=192.168.201.65-192.168.201.66\r\n
add name=pool201.16ovpnMaster next-pool=pool201.17ovpnMaster ranges=192.168.201.61-192.168.201.62\r\n
add name=pool201.15ovpnMaster next-pool=pool201.16ovpnMaster ranges=192.168.201.57-192.168.201.58\r\n
add name=pool201.14ovpnMaster next-pool=pool201.15ovpnMaster ranges=192.168.201.53-192.168.201.54\r\n
add name=pool201.13ovpnMaster next-pool=pool201.14ovpnMaster ranges=192.168.201.49-192.168.201.50\r\n
add name=pool201.12ovpnMaster next-pool=pool201.13ovpnMaster ranges=192.168.201.45-192.168.201.46\r\n
add name=pool201.11ovpnMaster next-pool=pool201.12ovpnMaster ranges=192.168.201.41-192.168.201.42\r\n
add name=pool201.10ovpnMaster next-pool=pool201.11ovpnMaster ranges=192.168.201.37-192.168.201.38\r\n
add name=pool201.09ovpnMaster next-pool=pool201.10ovpnMaster ranges=192.168.201.33-192.168.201.34\r\n
add name=pool201.08ovpnMaster next-pool=pool201.09ovpnMaster ranges=192.168.201.29-192.168.201.30\r\n
add name=pool201.07ovpnMaster next-pool=pool201.08ovpnMaster ranges=192.168.201.25-192.168.201.26\r\n
add name=pool201.06ovpnMaster next-pool=pool201.07ovpnMaster ranges=192.168.201.21-192.168.201.22\r\n
add name=pool201.05ovpnMaster next-pool=pool201.06ovpnMaster ranges=192.168.201.17-192.168.201.18\r\n
add name=pool201.04ovpnMaster next-pool=pool201.05ovpnMaster ranges=192.168.201.13-192.168.201.14\r\n
add name=pool201.03ovpnMaster next-pool=pool201.04ovpnMaster ranges=192.168.201.9-192.168.201.10\r\n
add name=pool201.02ovpnMaster next-pool=pool201.03ovpnMaster ranges=192.168.201.5-192.168.201.6\r\n
add comment=\"Master-OpenVPN-Port\" name=pool201.01ovpnMaster next-pool=pool201.02ovpnMaster ranges=192.168.201.1-192.168.201.2\r\n"
/tool graphing interface
add allow-address=192.168.96.0/20
add allow-address=192.168.112.0/20
/tool graphing queue
add allow-address=192.168.112.0/20
add allow-address=192.168.112.0/20
/tool graphing resource
add allow-address=192.168.96.0/20
add allow-address=192.168.112.0/20
And now one new log without VLAN:
11:14:41 caps,info 08:E6:XX:XX:XX:A8@cap5G-AP_Hall1_Rest connected, signal strength -86
11:14:41 firewall,info Not allowed! forward: in:bridge_LAN(E0-sfp_Uplink) out:bridge_LAN(E10_AP), src-mac 08:e6:XX:XX:XX:A8, proto UDP, 0.0.0.0:68->255.255.255.255:67, len 328
11:14:41 firewall,info Not allowed! forward: in:bridge_LAN(E0-sfp_Uplink) out:bridge_LAN(wlan13), src-mac 08:e6:XX:XX:XX:a8, proto UDP, 0.0.0.0:68->255.255.255.255:67, len 328
11:14:41 firewall,info Not allowed! forward: in:bridge_LAN(E0-sfp_Uplink) out:bridge_LAN(wlan6), src-mac 08:e6:XX:XX:XX:a8, proto UDP, 0.0.0.0:68->255.255.255.255:67, len 328
11:14:42 dhcp,info dhcp500 assigned 192.168.130.9 to 08:E6:XX:XX:XX:A8
Its just a a DHCP Discover message from one client connected to one of the hAP ac² with datapath VLAN500. This one is not connected to E10_AP but to E0-sfp_Uplink.
But it doesn't matter where it comes from. As the config of E0 is
frame-types=admit-only-vlan-tagged ingress-filtering=yes it must have a vlan incoming. And the dhcp-server for VLAN500 on the input chain gives him the right IP:
And I can see, it just touches the wlan ports with vlan500:
(For all interested readers, who askes themselves "Where is wlan13 and wlan6? Don't see them in the config." -> They are dynamic ports from the capsman, he makes a few dynamic interfaces, and they just become numbers.)
See
/interface bridge VLAN:
Flags: X - disabled, D - dynamic
# BRIDGE VLAN-IDS CURRENT-TAGGED CURRENT-UNTAGGED
0 bridge_LAN 100 bridge_LAN
E10_AP
E0-sfp_Uplink
wlan5G
wlan2G
1 bridge_LAN 200 bridge_LAN
E10_AP
E0-sfp_Uplink
wlan5
wlan14
2 bridge_LAN 500 bridge_LAN
E10_AP
E0-sfp_Uplink
wlan6
wlan13
3 bridge_LAN 800 bridge_LAN
E0-sfp_Uplink
4 bridge_LAN 900 bridge_LAN
E0-sfp_Uplink
and the /interface bridge port
Flags: X - disabled, I - inactive, D - dynamic, H - hw-offload
# INTERFACE BRIDGE HW PVID PR PATH-COST INTERNA... HORIZON
0 E10_AP bridge_LAN yes 100 0x 10 10 none
1 E0-sfp_Uplink bridge_LAN yes 1 0x 10 10 none
2 I bond_1 bridge_LAN yes 100 0x 10 10 none
3 I bond_2 bridge_LAN yes 1 0x 10 10 none
4 I bond_Switch1 bridge_LAN yes 1 0x 10 10 none
5 I bond_Switch2 bridge_LAN yes 1 0x 10 10 none
6 D wlan5G bridge_LAN 100 0x 10 10 none
7 D wlan5 bridge_LAN 200 0x 10 10 none
8 D wlan6 bridge_LAN 500 0x 10 10 none
9 D wlan2G bridge_LAN 100 0x 10 10 none
10 D wlan13 bridge_LAN 500 0x 10 10 none
11 D wlan14 bridge_LAN 200 0x 10 10 none
So I do not think its a problem of the switch the packet passes before the 4011. It did not touch the other ports like wlan2G or wlan14. I can't check this with a tool at this moment because there is nearly no traffic, the packet in the log is a little bit old. And on the other hand it doesn't make sence when a packet just forwards to the ports of vlan 500 and no other ports, it might have vlan 500.
So why doesn't this packet get an
in:vlan500(E0-sfp_Uplink), just an
in:bridge_LAN(E0-sfp_Uplink) ?!?
Now it is a really long posting with a long config, but hopefully all Informations are now in this posting. Splitting the config in two postings or skipping lines was a really bad idea, sorry.