great
Okey, now I tested the suggested solution I was given from MT support.
The result:
It is _NOT_ working when /interface ethernet switch set forward-unknown-vlan=no
It has to be /interface ethernet switch set forward-unknown-vlan=yes or no traffic is passed at all.
Leaking traffic ?:
I did connect one MT device to ether6 of my CRS switch, and logged in to it and then I did /tools packet sniffer
I let it run for one hour during prime time backup and lot of noice in all vlans, I was not able to pick up any traffic leaking, I saw only traffic belonging to that VLAN.
I will connect one network analyzer to ether6 and the other ports as well tomorrow and come back with that result as well.
But so far, it looks like it actually was working!
Here is my devices lab configuration:
Cisco2960 --- vlan trunk (20, 100, 200, 220, 300, 400) --- CRS ether1
Here is the Cisco2960 switch configuration, port 13 is connected to ether1 of the CRS switch.
==================================================================
swfredriksdal2#show interfaces fastEthernet 0/13 status
Port Name Status Vlan Duplex Speed Type
Fa0/13 Desktop trunk connected trunk a-full a-100 10/100BaseTX
swfredriksdal2#show ip interface fastEthernet 0/13
FastEthernet0/13 is up, line protocol is up
Inbound access list is not set
swfredriksdal2# show interfaces trunk
Port Mode Encapsulation Status Native vlan
Fa0/13 on 802.1q trunking 1
Port Vlans allowed on trunk
Fa0/13 20,100,200,220,300,400
Port Vlans allowed and active in management domain
Fa0/13 20,100,200,220,300,400
Port Vlans in spanning tree forwarding state and not pruned
Fa0/13 20,100,200,220,300,400
VLAN 20 comes from another switch, and it does not have any access ports in this switch.
swfredriksdal2#show vlan brief
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
200 dmz1 active Fa0/5, Fa0/10, Fa0/11, Fa0/12
Fa0/21
220 dmz3 active Fa0/15, Fa0/19, Fa0/20, Gi0/2
300 MGT active Fa0/6, Fa0/9, Fa0/18, Fa0/22
Fa0/24
310 mgt2 active Fa0/7, Fa0/8
320 mgt3 active
400 dmz2 active Fa0/2
Here is my CRS configuration:
======================
/interface ethernet
set [ find default-name=ether6 ] master-port=ether1
set [ find default-name=ether7 ] master-port=ether1
set [ find default-name=ether8 ] master-port=ether1
set [ find default-name=ether9 ] master-port=ether1
set [ find default-name=ether10 ] master-port=ether1
set [ find default-name=ether11 ] master-port=ether1
# Tagging should be set on ether1 because it is a VLAN trunk port.
# Additionally, set switch1-cpu for VLAN200 to access IP address on VLAN
interface, the frames should be tagged on it as well.
/interface ethernet switch egress-vlan-tag
add tagged-ports=ether1 vlan-id=20
add tagged-ports=ether1 vlan-id=100
add tagged-ports=ether1,switch1-cpu vlan-id=200
add tagged-ports=ether1 vlan-id=220
add tagged-ports=ether1 vlan-id=300
add tagged-ports=ether1 vlan-id=400
/interface ethernet switch ingress-vlan-translation
add new-customer-vid=20 ports=ether6 sa-learning=yes
add new-customer-vid=100 ports=ether7 sa-learning=yes
add new-customer-vid=200 ports=ether8 sa-learning=yes
add new-customer-vid=220 ports=ether9 sa-learning=yes
add new-customer-vid=300 ports=ether10 sa-learning=yes
add new-customer-vid=400 ports=ether11 sa-learning=yes
# VLAN mebership should be adjusted according to VLAN tagging.
# VLAN id on ether1 and access port and for VLAN200 switch1-cpu port as well.
/interface ethernet switch vlan
add ports=ether1,ether6 vlan-id=20
add ports=ether1,ether7 vlan-id=100
add ports=ether1,ether8,switch1-cpu vlan-id=200
add ports=ether1,ether9 vlan-id=220
add ports=ether1,ether10 vlan-id=300
add ports=ether1,ether11 vlan-id=400
# Other VLAN interfaces seem to be unnecessary because they do not have IP address.
/interface vlan
add interface=ether1 l2mtu=1584 name=vlan200 vlan-id=200
/ip address
add address=172.16.1.111/24 interface=vlan200 network=172.16.1.0
# Putting no directly fully disables ALL traffic through the switch, it seems to work with yes, so far...
/interface ethernet switch
set forward-unknown-vlan=yes
Some tests
=========
Pinging from CRS:
[admin@MikroTik] > ping 172.16.1.1
HOST SIZE TTL TIME STATUS
172.16.1.1 56 64 1ms
172.16.1.1 56 64 0ms
172.16.1.1 56 64 0ms
172.16.1.1 56 64 0ms
sent=4 received=4 packet-loss=0% min-rtt=0ms avg-rtt=0ms max-rtt=1ms
Pinging from PC:
Microsoft Windows [Version 6.0.6002]
Copyright (c) 2006 Microsoft Corporation. Med ensamrätt.
C:\Users\peter>ping 172.16.1.111
Skickar ping-signal till 172.16.1.111 med 32 byte data:
Svar från 172.16.1.111: byte=32 tid < 1 ms TTL=64
Svar från 172.16.1.111: byte=32 tid < 1 ms TTL=64
Svar från 172.16.1.111: byte=32 tid < 1 ms TTL=64
Svar från 172.16.1.111: byte=32 tid=1ms TTL=64
Ping-statistik för 172.16.1.111:
Paket: Skickade = 4, Mottagna = 4, Förlorade = 0 (0 %),
Ungefärlig överföringstid i millisekunder:
Lägsta = 0 ms, Högsta = 1 ms, Medel = 0 ms
C:\Users\peter>
Pinging the ether6 connected AP from CRS:
[admin@MikroTik SW1] > ping 192.168.1.35
HOST SIZE TTL TIME STATUS
192.168.1.35 56 63 1ms
192.168.1.35 56 63 0ms
192.168.1.35 56 63 0ms
sent=3 received=3 packet-loss=0% min-rtt=0ms avg-rtt=0ms max-rtt=1ms
Pinging the connected AP from the PC in another subnet, through the Cisco- > CRS -> AP:
C:\Users\peter>ping 192.168.1.35
Skickar ping-signal till 192.168.1.35 med 32 byte data:
Svar från 192.168.1.35: byte=32 tid=4ms TTL=63
Svar från 192.168.1.35: byte=32 tid=1ms TTL=63
Svar från 192.168.1.35: byte=32 tid=1ms TTL=63
Svar från 192.168.1.35: byte=32 tid=1ms TTL=63
Ping-statistik för 192.168.1.35:
Paket: Skickade = 4, Mottagna = 4, Förlorade = 0 (0 %),
Ungefärlig överföringstid i millisekunder:
Lägsta = 1 ms, Högsta = 4 ms, Medel = 1 ms
So far so good, as written above, I will do network analysis on the CRS switchports tomorrow and see if it leaks traffic like before. If not, I will say this configuration might work. Then next up will be load tests and stability tests.