/interface vlan
add arp=enabled comment="" disabled=no interface=ether1 mtu=1500 name=vlan1 use-service-tag=no vlan-id=1
add arp=enabled comment="" disabled=no interface=ether1 mtu=1500 name=vlan2 use-service-tag=no vlan-id=2
/interface bridge
add arp=enabled disabled=no
/interface bridge port
add bridge=bridge1 disabled=no interface=vlan1
add bridge=bridge1 disabled=no interface=vlan2
/interface bridge settings
set use-ip-firewall=yes
/ip firewall filter
add action=accept chain=forward disabled=no in-interface=ether1 out-interface=bridge1
add action=accept chain=forward disabled=no in-interface=bridge1 out-interface=ether1
add action=reject chain=forward disabled=no
/interface vlan
add arp=enabled comment="" disabled=no interface=ether2 mtu=1500 name=vlan109 use-service-tag=no vlan-id=109
add arp=enabled comment="" disabled=no interface=ether2 mtu=1500 name=vlan110 use-service-tag=no vlan-id=110
add arp=enabled comment="" disabled=no interface=ether2 mtu=1500 name=vlan111 use-service-tag=no vlan-id=111
add arp=enabled comment="" disabled=no interface=ether2 mtu=1500 name=vlan112 use-service-tag=no vlan-id=112
/interface bridge port
add bridge=subscriberBridge disabled=no interface=vlan109
add bridge=subscriberBridge disabled=no interface=vlan110
add bridge=subscriberBridge disabled=no interface=vlan111
add bridge=subscriberBridge disabled=no interface=vlan112
/interface bridge settings
set use-ip-firewall=yes
/ip firewall filter
add action=accept chain=forward disabled=no in-interface=ether2 out-interface=subscriberBridge
add action=accept chain=forward disabled=no in-interface=subscriberBridge out-interface=ether2
add action=reject chain=forward disabled=no
/interface bridge filter add chain=forward in-bridge=subscriberBridge out-bridge=subscriberBridge action=drop disabled=no
/interface bridge add name=subscriberBridge
/interface bridge settings set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
/interface vlan add interface=ether2 vlan-id=101 name="rm201" disabled=no
/interface vlan add interface=ether2 vlan-id=102 name="rm202" disabled=no
/interface vlan add interface=ether2 vlan-id=103 name="rm203" disabled=no
/interface vlan add interface=ether2 vlan-id=104 name="rm204" disabled=no
/interface vlan add interface=ether2 vlan-id=105 name="rm205" disabled=no
/interface bridge port add bridge=subscriberBridge interface="rm201" disabled=no
/interface bridge port add bridge=subscriberBridge interface="rm202" disabled=no
/interface bridge port add bridge=subscriberBridge interface="rm203" disabled=no
/interface bridge port add bridge=subscriberBridge interface="rm204" disabled=no
/interface bridge port add bridge=subscriberBridge interface="rm205" disabled=no
/interface bridge filter add chain=forward in-bridge=subscriberBridge out-bridge=subscriberBridge action=drop disabled=no
This is slightly off your topic, but you are one of very few using the ip-firewall-for-vlan=yes command./interface bridge settings set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
what does it mean? what does http://google.com says after login?but after logging in, they go back to the 192.168.5.253 network.
an example?..
Code: Select all/interface vlan add arp=enabled comment="" disabled=no interface=ether1 mtu=1500 name=vlan1 use-service-tag=no vlan-id=1 add arp=enabled comment="" disabled=no interface=ether1 mtu=1500 name=vlan2 use-service-tag=no vlan-id=2 /interface bridge add arp=enabled disabled=no /interface bridge port add bridge=bridge1 disabled=no interface=vlan1 add bridge=bridge1 disabled=no interface=vlan2 /interface bridge settings set use-ip-firewall=yes /ip firewall filter add action=accept chain=forward disabled=no in-interface=ether1 out-interface=bridge1 add action=accept chain=forward disabled=no in-interface=bridge1 out-interface=ether1 add action=reject chain=forward disabled=no
/interface list add name=vlans
/interface list member
add list=vlans interface=vlan1
...
add list=vlans interface=vlanN
/ip firewall filter add chain=forward in-interface-list=vlans out-interface-list=vlans action=reject
Code: Select all/interface list add name=vlans /interface list member add list=vlans interface=vlan1 ... add list=vlans interface=vlanN /ip firewall filter add chain=forward in-interface-list=vlans out-interface-list=vlans action=reject
Code: Select all/interface list add name=vlans /interface list member add list=vlans interface=vlan1 ... add list=vlans interface=vlanN /ip firewall filter add chain=forward in-interface-list=vlans out-interface-list=vlans action=reject
When I enable this firewall rule
/ip firewall filter add chain=forward in-interface-list=vlans out-interface-list=vlans action=reject
and my vlans are enable, the Cisco switch to the mikrotik trunk device the following error and blocks the port and this roll does not work What do you think of it ?
Description: Blocking GigabitEthernet1/0/38 on VLAN0086. Inconsistent peer vlan.
Description: Blocking GigabitEthernet1/0/38 on VLAN0087. Inconsistent local vlan.
my config
********************************************************************
/interface bridge
add fast-forward=no name=bridge1 protocol-mode=none
/interface ethernet
set [ find default-name=combo1 ] name=combo1-WAN
set [ find default-name=ether1 ] name=ether1-Trunk
/interface vlan
add interface=ether1-Trunk name=vlan-Radius-100 vlan-id=100
add interface=ether1-Trunk loop-protect=off name=vlan86 vlan-id=86
add interface=ether1-Trunk loop-protect=off name=vlan87 vlan-id=87
/interface list
add name=vlans
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
add dns-name=net.net hotspot-address=172.16.87.254 login-by=\
http-chap,https name=hsprof-Hotspot radius-interim-update=1m \
ssl-certificate=private.key_0 use-radius=yes
/ip pool
add name=hs-pool-Hotspot ranges=172.16.80.2-172.16.87.253
/ip hotspot
add address-pool=hs-pool-Hotspot disabled=no interface=bridge1 name=hotspot1 \
profile=hsprof-Hotspot
/ip hotspot user profile
set [ find default=yes ] add-mac-cookie=no address-pool=hs-pool-Hotspot \
idle-timeout=25m name=User-Profile-Hotspot shared-users=10 \
status-autorefresh=5m
/interface bridge port
add bridge=bridge1 interface=vlan86
add bridge=bridge1 interface=vlan87 pvid=87
/interface bridge settings
set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
/interface list member
add interface=vlan86 list=vlans
add interface=vlan87 list=vlans
/ip address
add address=1.1.1.15/24 interface=combo1-WAN network=1.1.1.0
add address=172.16.87.254/21 interface=bridge1 network=172.16.80.0
add address=192.168.100.6/24 interface=vlan-Radius-100 network=192.168.100.0
/ip dns
set servers=1.1.1.220,8.8.8.8
/ip dns static
add address=172.16.87.254 name=net.net ttl=5m
/ip firewall filter
add action=passthrough chain=unused-hs-chain comment="place hotspot rules here" \
disabled=yes
add action=reject chain=forward in-interface-list=vlans out-interface-list=\
vlans reject-with=icmp-network-unreachable
/ip firewall nat
add action=passthrough chain=unused-hs-chain comment="place hotspot rules here" \
disabled=yes
add action=masquerade chain=srcnat comment="masquerade hotspot network-VLAN-86" \
out-interface=combo1-WAN src-address=172.16.80.0/21
/ip hotspot user
add name=admin password=aaaaaa
/ip route
add distance=1 gateway=1.1.1.1
**************************************************************************
To enable Hotspot on vlansDo not add those vlans to the bridge. Why have you done that?
My network has matured over 100 vlan For wlan lanSo make one big vlan Why do you need many of them if you bridge them anyway?
Or create one Hotspot per VLAN.
Well, as a "workaround", you may set the same Horizon value while adding VLANs as Bridge ports...
vlan is a way for isolate different networks, bridge is the opposit situation, why you would to brigdge if your scope is isolate every network?Why better? Could you explain?