Hello,
192.168.0.0/16 is my main LAN and I have a guest network at 172.16.0.0/12.
I want the router to query my private DNS server at 192.168.x.x on behalf of the clients in the guest network.
How would I do this?
/export file=anynameyoulike
The 9.9.9.9 DNS server is temporary.Can you share your current config?
All the tutorials I followed for creating a guest wifi did it this way.Should try to only use ONE Bridge where possible.
In this case you dont need two bridge.
You mean I have to make the guest pool a subnet of 192.168.x.x/x and cannot use 172.16.0.0/12?Simply assign the wifi interface the appropriate address as the second subnet.
Bear with me. I'm new. I'm trying to clarify what you said.
No, the guest network accesses the guest pool 172..........., where do you see them getting any other IP addresses?
Where can I do that?we assign the guest wifi port the Ip address.
I already have this.Why do you ask, I gave it to you in the config!!!
add address=172.16.0.1/12 interface=guest_wifi network=172.16.0.0
/ip neighbor discovery-settings
set discover-interface-list=MGMT
What you posted seems to reflect my config except the "MGMT" part. I have not copy-pasted literally because annoyingly the terminal doesn't allow pasting and I have not setup SSH.I gave it to you in the config
But then I can't connect to guest wifi anymore.Probable because you have not taken the guest_wifi interface off of the /interface bridge port settings yet.
/ip firewall filter
add action=drop chain=input comment="Deny ICMP echo (ping) requests from outside" icmp-options=8:0-255 in-interface-list=!LAN protocol=icmp
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new \
in-interface-list=WAN
add action=reject chain=input comment="deny guest to main network" dst-address=192.168.0.0/16 reject-with=icmp-network-unreachable src-address=\
172.16.0.0/12
add action=reject chain=output comment="Block UDP port 53" dst-address=!192.168.x.x dst-port=53 log=yes log-prefix="block DNS" protocol=udp \
reject-with=icmp-admin-prohibited
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat dst-address=192.168.x.x dst-port=53 out-interface=bridge protocol=udp src-address=172.16.0.0/12 to-addresses=\
192.168.x.x
add action=dst-nat chain=dstnat comment="Redirect DNS to router" dst-address=!192.168.x.x dst-port=53 protocol=udp src-address=!192.168.x.x \
to-addresses=192.168.x.x to-ports=53
add action=dst-nat chain=dstnat protocol=udp src-address=192.168.x.0/24 src-port=53 to-addresses=192.168.x.x
add action=dst-nat chain=dstnat dst-address=!192.168.x.xdst-port=53 protocol=tcp src-address=!192.168.x.x to-addresses=192.168.x.x to-ports=53
add action=masquerade chain=srcnat protocol=udp src-address=192.168.x.0/24 to-ports=53
add action=masquerade chain=srcnat protocol=tcp src-address=192.168.x.0/24 to-ports=53
add action=dst-nat chain=dstnat disabled=yes dst-address=172.16.0.0/12 to-addresses=192.168.x.x
/ip service
set telnet disabled=yes
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" dst-port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
DNS works with a guest bridge now so I'm not sure I want to give it another shot with just one. If all the tutorials I've seen are using a guest bridge, it's probably good enough for me.YOu need to post the latest config WITH the recommended changes that you claim does not work.
THen we can make progress.
192.168.0.0/16 is my main LAN and I have a guest network at 172.16.0.0/12.
Noted. I used these for the sake of simplicity during testing.192.168.0.0/16 is my main LAN and I have a guest network at 172.16.0.0/12.
It's wrong to allocate so much space to IPs:
I don't think you have ~65024 devices in the main network,
as I don't think you can have (on a single wifi then...) ~1040384 guests.
All it takes is a stupid antivirus or an IP scan to fill the device cache and block your entire network...
Default ARP size is 8192 record, and just your main LAN is 8 times more... And guests 127 times more...
Actually there is another report by a user that was not able to make a DHCP server listening to wifi slave interface even if that interface is not in a bridge.Probable because you have not taken the guest_wifi interface off of the /interface bridge port settings yet.
Bedtime here...