@anav: i read your post a couple of times, but i couldn`t get any information out of it. sorry for that, i assume that`s my bad
I conitnued testing, read the whole link in i think i got a clearer understanding.
Here my situation.
I`ve got a Draytek Vigor Router. All used VLANs are managed on it, each with a separate DHCP. (VLANs also configured in Unif Controller)
All the VLANs are tagged on Port 1 of the Router.
From there a connection goes to a Unifi Switch. The Switch Port Profile is set to "All", for those who are familair with Unifi (means it relays all VLAN tags afaik).
From this Switch i have a SFP connection to a Unifi POE Switch, both ports also have the Switch Port Profile "All".
From this POE switch i have a connection to a CAP AC to Ether1.
No i applied the configuration below. (I used VLAN ID 1 for managment because this is the default Unifi ID for management LAN afaik)
As soon as i import the configuration (import was successfull) i can not reach the AP anymore with Winbox. Also i can not see any SSID`s. I tried to assign my computer to the VLAN 17, but it still does not work.
Any idea what might go wrong?
# 1970-01-02 00:24:07 by RouterOS 7.14.1
# software id = Q3XX-5EBT
#
# model = RBcAPGi-5acD2nD
# serial number = HG209G78CJB
#######################################
# VLAN Overview
#######################################
# 17 = Home (mkthome)
# 98 = IoT (mktIoT)
# 99 = HomeOffice (mktHomeoffice)
# 1 =Base (MGMT) VLAN
#######################################
# WIFI Setup
#
#######################################
/interface wifi configuration
add country=Germany disabled=no mode=ap name=cfg_mkthome ssid=mkthome
add country=Germany disabled=no mode=ap name=cfg_mktIoT ssid=mktIoT
add country=Germany disabled=no mode=ap name=cfg_mktHomeoffice ssid=mktHomeoffice
/interface wifi security
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=sec_mkthome wps=\
disable
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=sec_mktIoT wps=\
disable
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=sec_mktHomeoffice wps=\
disable
/interface wifi
set [ find default-name=wifi1 ] configuration=cfg_mkthome configuration.mode=\
ap disabled=no security=sec_mkthome
set [ find default-name=wifi2 ] configuration=cfg_mkthome configuration.mode=\
ap disabled=no security=sec_mkthome
add configuration=cfg_mktIoT configuration.mode=ap disabled=no mac-address=\
D6:01:C3:13:82:6B master-interface=wifi1 name=wifi3 security=sec_mktIoT
add configuration=cfg_mktIoT configuration.mode=ap disabled=no mac-address=\
D6:01:C3:13:82:6C master-interface=wifi2 name=wifi4 security=sec_mktIoT
add configuration=cfg_mktHomeoffice configuration.mode=ap disabled=no mac-address=\
D6:01:C3:13:82:6D master-interface=wifi1 name=wifi5 security=sec_mktHomeoffice
add configuration=cfg_mktHomeoffice configuration.mode=ap disabled=no mac-address=\
D6:01:C3:13:82:6E master-interface=wifi2 name=wifi6 security=sec_mktHomeoffice
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
#/ip address
/system identity
set name=MikroTik_AP1
/system note
set show-at-login=no
#######################################
# Bridge
#######################################
# create one bridge, set VLAN mode off while we configure
/interface bridge add name=BR1 protocol-mode=none vlan-filtering=no
#######################################
#
# -- Access Ports --
#
# wifi1, wifi3, wifi5 = 2,4Ghz
# wifi2, wifi4, wifi6 = 5Ghz
#######################################
# ingress behavior
/interface bridge port
# mkthome, mktIot VLAN
#(192.168.17.x)
add bridge=BR1 interface=wifi1 pvid=17
add bridge=BR1 interface=wifi2 pvid=17
# (192.168.98.x)
add bridge=BR1 interface=wifi3 pvid=98
add bridge=BR1 interface=wifi4 pvid=98
# (192.168.99.x)
add bridge=BR1 interface=wifi5 pvid=99
add bridge=BR1 interface=wifi6 pvid=99
# egress behavior, handled automatically
#######################################
#
# -- Trunk Ports --
#
#######################################
# ingress behavior
/interface bridge port
# Purple Trunk. Leave pvid set to default of 1
add bridge=BR1 interface=ether1
# egress behavior
/interface bridge vlan
# Purple Trunk. L2 switching only, Bridge not needed as tagged member (except BASE_VLAN)
add bridge=BR1 tagged=ether1 vlan-ids=17
add bridge=BR1 tagged=ether1 vlan-ids=98
add bridge=BR1 tagged=ether1 vlan-ids=99
# (192.168.0.x)
add bridge=BR1 tagged=BR1,ether1 vlan-ids=1
#######################################
# IP Addressing & Routing
#######################################
# LAN facing AP's Private IP address on a BASE_VLAN
/interface vlan add interface=BR1 name=BASE_VLAN vlan-id=1
/ip address add address=192.168.0.200/24 interface=BASE_VLAN
# The Router's IP this AP will use
/ip route add distance=1 gateway=192.168.0.1
#######################################
# IP Services
#######################################
# We have a router that will handle this. Nothing to set here.
# Attach this AP to a router configured as shown under the "RoaS" example.
#######################################
# VLAN Security
#######################################
# Only allow ingress packets without tags on Access Ports
/interface bridge port
set bridge=BR1 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wifi1]
set bridge=BR1 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wifi2]
set bridge=BR1 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wifi3]
set bridge=BR1 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wifi4]
set bridge=BR1 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wifi5]
set bridge=BR1 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wifi6]
# Only allow ingress packets WITH tags on Trunk Ports
/interface bridge port set bridge=BR1 ingress-filtering=yes frame-types=admit-only-vlan-tagged [find interface=ether1]
#######################################
# MAC Server settings
#######################################
# Ensure only visibility and availability from BASE_VLAN, the MGMT network
/interface list add name=BASE
/interface list member add interface=BASE_VLAN list=BASE
/ip neighbor discovery-settings set discover-interface-list=BASE
/tool mac-server mac-winbox set allowed-interface-list=BASE
/tool mac-server set allowed-interface-list=BASE
#######################################
# Turn on VLAN mode
#######################################
/interface bridge set BR1 vlan-filtering=yes